ZyXEL Communications unified security gateway User Manual

ZyWALL USG 20/20W

Unified Security Gateway
LAN Port P2, P3 IP Address https://192.168.1.1 User Name admin Password 1234
www.zyxel.com
Version 2.21 Edition 4, 4/2011
www.zyxel.com
Copyright © 2011 ZyXEL Communications Corporation

About This User's Guide

About This User's Guide
Intended Audience
This manual is intended for people who want to want to configure the ZyWALL using the Web Configurator.
How To Use This Guide
•Read Chapter 1 on page 29 chapter for an overview of features available on the ZyWALL.
•Read Chapter 3 on page 43 for web browser requirements and an introduction to the main components, icons and menus in the ZyWALL Web Configurator.
•Read Chapter 4 on page 59 if you’re using the installation wizard for first time setup and you want more detailed information than what the real time online help provides.
•Read Chapter 5 on page 69 if you’re using the quick setup wizards and you want more detailed information than what the real time online help provides.
• It is highly recommended you read Chapter 6 on page 87 for detailed information on essential terms used in the ZyWALL, what prerequisites are needed to configure a feature and how to use that feature.
• It is highly recommended you read Chapter 7 on page 107 for ZyWALL application examples.
• Subsequent chapters are arranged by menu item as defined in the Web Configurator. Read each chapter carefully for detailed information on that menu item.
• To find specific information in this guide, use the Contents Overview, the Table of Contents, the Index, or search the PDF file. E-mail techwriters@zyxel.com.tw if you cannot find the information you require.
Related Documentation
•Quick Start Guide
The Quick Start Guide is designed to show you how to make the ZyWALL hardware connections and access the Web Configurator wizards. (See the wizard real time help for information on configuring each screen.) It also contains a connection diagram and package contents list.
•CLI Reference Guide
The CLI Reference Guide explains how to use the Command-Line Interface (CLI) to configure the ZyWALL.
Note: It is recommended you use the Web Configurator to configure the ZyWALL.
ZyWALL USG 20/20W User’s Guide
3
About This User's Guide
• Web Configurator Online Help
Click the help icon in any screen for help in configuring that screen and supplementary information.
• ZyXEL Web Site
Please refer to www.zyxel.com product certifications.
for additional support documentation and
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
Need More Help?
More help is available at www.zyxel.com.
4
• Download Library
Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product.
• Knowledge Base
If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products.
ZyWALL USG 20/20W User’s Guide
About This User's Guide
•Forum
This contains discussions on ZyXEL products. Learn from others who use ZyXEL products and share your experiences as well.
Customer Support
Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device.
See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.
• Product model and serial number.
•Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
Disclaimer
Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate.
ZyWALL USG 20/20W User’s Guide
5

Document Conventions

Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
Warnings tell you about things that could harm you or your device.
Note: Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The ZyWALL may be referred to as the “ZyWALL”, the “device”, the “system” or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
Document Conventions
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key. “Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click
Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
6
ZyWALL USG 20/20W User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The ZyWALL icon is not an exact representation of your device.
ZyWALL Computer Notebook computer
Server Firewall Telep h o n e
Switch Router
ZyWALL USG 20/20W User’s Guide
7

Safety Warnings

• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Do NOT remove the plug and connect it to a power outlet by itself; always attach the plug to the power adaptor first before connecting it to a power outlet.
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
• CAUTION: RISK OF EXPLOSION IF BATTERY (on the motherboard) IS REPLACED BY AN INCORRECT TYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS. Dispose them at the applicable collection point for the recycling of electrical and electronic equipment. For detailed information about recycling of this product, please contact your local city office, your household waste disposal service or the store where you purchased the product.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Antenna Warning! This device meets ETSI and FCC certification requirements when using the included antenna(s). Only use the included antenna(s).
• If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged.
Safety Warnings
8
Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.
ZyWALL USG 20/20W User’s Guide

Contents Overview

Contents Overview
User’s Guide .............................................................................................. .......... ...................27
Introducing the ZyWALL ............................................................................................................ 29
Features and Applications ......................................................................................................... 37
Web Configurator ......................................... .... ... ... ... .... ... ... ............................................. .......... 43
Installation Setup Wizard .................................... ............................................................. ..........59
Quick Setup ............................................................................................................................... 69
Configuration Basics .............. ............................................. ... .... ................................................ 87
Tutorials ................................................................................................. ..................................107
Technical Reference ............................................................................................................163
Dashboard ............................................................................................................................... 165
Monitor ...................................... ....................... ................... ....................... .............................. 177
Registration ..............................................................................................................................211
Interfaces ..................................... .................................................... ........................................ 217
Trunks .................................................... .......................................... ........................................ 289
Policy and Static Routes ..........................................................................................................297
Routing Protocols .................................................................................................................... 313
Zones .............................. .................... ................... .................... ................... ........................... 327
DDNS ......................................................................................................................................331
NAT ................................. ............................. .............................. ............................. ................. 337
HTTP Redirect ......................................................................................................................... 347
ALG ......................................................................................................................................... 351
IP/MAC Binding ....................................................................................................................... 359
Authentication Policy ............. ... ... .... ............................................. ... ... ..................................... 365
Firewall .................................................................................................................................... 373
IPSec VPN ................... ............................................. .... ... ............................................. ........... 391
SSL VPN ................................................................................................................................. 427
SSL User Screens .................................................................................................................. 437
SSL User Application Screens ................................................................................................447
ZyWALL SecuExtender ...... ... ... ... .... ... ... ... ............................................. .... ... ... ........................ 449
Bandwidth Management ........................................................................................................ 453
ADP ......................................................................................................................................... 467
Content Filtering .......... ... .... ... ............................................. ... .... .............................................. 487
Content Filter Reports ............................................................................................................. 513
Anti-Spam ................................................................................................................................ 521
User/Group .............................................................................................................................. 539
Addresses ........................... ................... ................... .................... ................... ........................ 555
Services .............................. ....................................................... .............................................. 561
ZyWALL USG 20/20W User’s Guide
9
Contents Overview
Schedules .............................. ................................................ .................................................. 567
AAA Server .............................................................................................................................. 573
Authentication Method .............................. ... .... ... ............................................. ... .... ... ..............583
Certificates ................................... ....................... ................... ....................... ........................... 589
ISP Accounts ............................................ ... .... ... ............................................. ... .... ..................611
SSL Application ....................................................................................................................... 615
Endpoint Security .................................................................................................................... 621
System ................................ ...................... ....................... ...................... .................................. 629
Log and Report ........................................................................................................................ 679
File Manager ............................................................................................................................693
Diagnostics ............................................................................................................................ 705
Packet Flow Explore ................................................................................................................ 715
Reboot ..................................................................................................................................... 723
Shutdown ......................................... ............................. ......................... .................................. 725
Troubleshooting .................................................. ..................................................................... 727
Product Specifications ............................................................................................................. 741
10
ZyWALL USG 20/20W User’s Guide

Table of Contents

Table of Contents
About This User's Guide..........................................................................................................3
Document Conventions............................................................................................................6
Safety Warnings ........................................................................................................................8
Contents Overview ...................................................................................................................9
Table of Contents....................................................................................................................11
Part I: User’s Guide................................................................................ 27
Chapter 1
Introducing the ZyWALL ........................................................................................................29
1.1 Overview and Key Default Settings .....................................................................................29
1.2 Wall-mounting ........ ... .... ... ... ... .............................................. ... ... .......................................... 29
1.3 Front Panel ............................................ .... ... ... ............................................. .... ... ................32
1.3.1 Front Panel LEDs ...................................... .... ... ... ............................................. ... .... ... 32
1.4 Management Overview .......... .............................................. ... ... ..........................................33
1.5 Starting and Stopping the ZyWALL ............................ ... ... .... ... ... ... ....................................... 34
Chapter 2
Features and Applications.....................................................................................................37
2.1 Features ............................................. ............................................. .... ... ............................. 37
2.2 Applications ........... ... .............................................. ... ... ... .................................................... 39
2.2.1 VPN Connectivity ................ ... ............................................. ... .... ... ............................. 39
2.2.2 SSL VPN Network Access ............... ............................................. ... ... ....................... 39
2.2.3 User-Aware Access Control ....................................................................................... 41
Chapter 3
Web Configurator....................................................................................................................43
3.1 Web Configurator Requirements ......................................................................................... 43
3.2 Web Configurator Access ....................................................................................................43
3.3 Web Configurator Screens Overview .................................................................................. 45
3.3.1 Title Bar .................................. ... ... .............................................. ... ... .......................... 46
3.3.2 Navigation Panel .......... .... ... ... ... ... .... .......................................................................... 47
3.3.3 Main Window .......................... ............................................. ... .... ................................52
3.3.4 Tables and Lists ........ ... .... ... ... ... ... .............................................. ... ... ..........................54
ZyWALL USG 20/20W User’s Guide
11
Table of Contents
Chapter 4
Installation Setup Wizard.......................................................................................................59
4.1 Installation Setup Wizard Screens ...................................................................................... 59
4.1.1 Internet Access Setup - WAN Interface ..................................................................... 59
4.1.2 Internet Access: Ethernet .......................................................................................... 60
4.1.3 Internet Access: PPPoE ............................................................................................. 61
4.1.4 Internet Access: PPTP .............................................................................................. 63
4.1.5 ISP Parameters ................................... ... ... .............................................. ... ... .............63
4.1.6 Internet Access - Finish .............................................................................................65
4.2 Device Registration ........................................................................................................... 65
Chapter 5
Quick Setup.............................................................................................................................69
5.1 Quick Setup Overview ..................................... ............................................. .... ... ................69
5.2 WAN Interface Quick Setup .................................................................................................70
5.2.1 Choose an Ethernet Interface ....................... ... ... ... .... ... ... .......................................... 70
5.2.2 Select WAN Type ................................... ... .... ... ... ... .... ... ............................................. 70
5.2.3 Configure WAN Settings ............................................................................................ 71
5.2.4 WAN and ISP Connection Settings ............................................................................ 72
5.2.5 Quick Setup Interface Wizard: Summary ................................................................... 74
5.3 VPN Quick Setup .......... ... ... ............................................. .... ... ............................................. 75
5.4 VPN Setup Wizard: Wizard Type ......................................................................................... 76
5.5 VPN Express Wizard - Scenario ......................................................................................... 77
5.5.1 VPN Express Wizard - Configuration ................................. ....................................... 78
5.5.2 VPN Express Wizard - Summary ................................. ... ... ....................................... 79
5.5.3 VPN Express Wizard - Finish .................................................................................... 80
5.5.4 VPN Advanced Wizard - Scenario ............................................................................ 81
5.5.5 VPN Advanced Wizard - Phase 1 Settings ...............................................................82
5.5.6 VPN Advanced Wizard - Phase 2 ............................................................................. 83
5.5.7 VPN Advanced Wizard - Summary ........................................................................... 85
5.5.8 VPN Advanced Wizard - Finish ................................................................................. 86
Chapter 6
Configuration Basics..............................................................................................................87
6.1 Object-based Configuration .......................... ... ... .... ............................................. ... ... ... .......87
6.2 Zones, Interfaces, and Physical Ports ................................................................................. 88
6.2.1 Interface Types .................................................... ... .... ... ............................................. 89
6.2.2 Default Interface and Zone Configuration .................................................................. 90
6.3 Terminology in the ZyWALL ....................... ... ... ... .... ............................................. ... ... ... .......91
6.4 Packet Flow ........................................... .............................................. ... ... .......................... 91
6.4.1 Routing Table Checking Flow ..................................................................................... 92
6.4.2 NAT Table Checking Flow .......................................................................... ... ... ... .... ... 94
6.5 Feature Configuration Overview ......................................................................................... 95
12
ZyWALL USG 20/20W User’s Guide
Table of Contents
6.5.1 Feature ...................................... ... .... ... ............................................. ... .... ... ................95
6.5.2 Licensing Registration ............................ ... .... ... ............................................. ... ... .... ... 96
6.5.3 Interface ....................... .... ... ... ............................................. ... .... ................................ 96
6.5.4 Trunks ................. ... ... ... .... ... ... ............................................. ... .... ................................ 96
6.5.5 Policy Routes ...................... ... ............................................. ... .... ... ............................. 96
6.5.6 Static Routes .................................... ... ............................................. ... .... ................... 98
6.5.7 Zones ..................... ... ............................................. .... ... ... .......................................... 98
6.5.8 DDNS ..... ... ............................................. ... .... ............................................. ... ... ... ....... 98
6.5.9 NAT .............................................. .... ... ... ............................................. .... ... ................ 98
6.5.10 HTTP Redirect ......................................................................................................... 99
6.5.11 ALG ........................................................................................................................ 100
6.5.12 Auth. Policy ............................................................................................................100
6.5.13 Firewall ................................................................................................................... 100
6.5.14 IPSec VPN ............................................................................................................. 101
6.5.15 SSL VPN ................................................................................................................ 101
6.5.16 Bandwidth Management ........................................................................................102
6.5.17 ADP ........................................................................................................................ 102
6.5.18 Content Filter ..........................................................................................................102
6.5.19 Anti-Spam ...............................................................................................................103
6.6 Objects ............................................ ............................................. ... .... .............................. 103
6.6.1 User/Group ....................... ............................................. ... ... .....................................104
6.7 System ............. ............................................. ... ... .............................................. ... ..............105
6.7.1 DNS, WWW, SSH, TELNET, FTP, SNMP, Vantage CNM ........................................105
6.7.2 Logs and Reports ..................................................................................................... 105
6.7.3 File Manager .......................... ... ... .... ............................................. ... ... ..................... 106
6.7.4 Diagnostics ................ ... .... ... ... ... ... .............................................. ... ... ........................ 106
6.7.5 Shutdown ..................... .... ... ... ............................................. ... .... ..............................106
Chapter 7
Tutorials.................................................................................................................................107
7.1 How to Configure Interfaces, Port Roles, and Zones ........................................................ 107
7.1.1 Configure a WAN Ethernet Interface ................................ ... ... .... ... ... ... .... ... ... ... ....... . 108
7.1.2 Configure Port Roles ................................................................................................ 109
7.1.3 Configure the DMZ Interface for a Local Network ............... ..................................... 109
7.1.4 Configure Zones ........................... .............................................. ... ... .........................110
7.2 How to Configure a Cellular Interface . ... .... ... ... ... .............................................. ... ... ... .........111
7.3 How to Configure Load Balancing ......................................................................................113
7.3.1 Set Up Available Bandwidth on Ethernet Interfaces .................................................113
7.3.2 Configure the WAN Trunk .........................................................................................114
7.4 How to Set Up an IPSec VPN Tunnel .................................................................................116
7.4.1 Set Up the VPN Gateway ..........................................................................................117
7.4.2 Set Up the VPN Connection ......................................................................................118
7.4.3 Configure Security Policies for the VPN Tunnel ...................................... ..................119
ZyWALL USG 20/20W User’s Guide
13
Table of Contents
7.5 How to Configure User-aware Access Control .................................................................. 120
7.5.1 Set Up User Accounts .............................................................................................. 120
7.5.2 Set Up User Groups ................................................................................................. 121
7.5.3 Set Up User Authentication Using the RADIUS Server .......................... ... ... ... ... .... . 122
7.6 How to Use a RADIUS Server to Authenticate User Accounts based on Groups ............. 124
7.7 How to Use Endpoint Security and Authentication Policies ............................................... 126
7.7.1 Configure the Endpoint Security Objects ................................................................. 126
7.7.2 Configure the Authentication Policy ......................................................................... 128
7.8 How to Configure Service Control ..................................................................................... 129
7.8.1 Allow HTTPS Administrator Access Only From the LAN ......................................... 130
7.9 How to Allow Incoming H.323 Peer-to-peer Calls ............................................... ... ... ... .... . 132
7.9.1 Turn On the ALG .............................. ... ............................................. ... .... ................. 133
7.9.2 Set Up a NAT Policy For H.323 ................................................................................133
7.9.3 Set Up a Firewall Rule For H.323 ............................................................................ 135
7.10 How to Allow Public Access to a Web Server .......................... ...... ....... ...... ....... ...... ....... . 136
7.10.1 Create the Address Objects ...................................................................................137
7.10.2 Configure NAT ........................................................................................................ 137
7.10.3 Set Up a Firewall Rule ........................................................................................... 138
7.11 How to Use an IPPBX on the DMZ .................................................................................. 139
7.11.1 Turn On the ALG .................................................................................................... 141
7.11.2 Create the Address Objects ................................................................................... 141
7.11.3 Setup a NAT Policy for the IPPBX .......................................................................... 142
7.11.4 Set Up a WAN to DMZ Firewall Rule for SIP .......................................................... 143
7.11.5 Set Up a DMZ to LAN Firewall Rule for SIP ......... .... ... ........................................... 144
7.12 How to Use Multiple Static Public WAN IP Addresses for LAN to WAN Traffic ............... 145
7.12.1 Create the Public IP Address Range Object ............ .............................................. 1 45
7.12.2 Configure the Policy Route .................................................................................... 146
7.13 How to Set Up a Wireless LAN ........................................................................................ 146
7.13.1 Set Up User Accounts ....................................... ... .... ... ........................................... 147
7.13.2 Create the WLAN Interface ....................................................................................147
7.13.3 Set Up the Wireless Clients to Use the WLAN Interface ........................................ 150
Part II: Technical Reference................................................................ 163
Chapter 8
Dashboard.............................................................................................................................165
8.1 Overview .......... ... ... ... .... ... ... ... .............................................. ... ... ... ..................................... 165
8.1.1 What Y ou Can Do in this Chapter ............................................................................165
8.2 The Dashboard Screen ..................................................................................................... 165
8.2.1 The CPU Usage Screen ........................................................................................... 171
8.2.2 The Memory Usage Screen ...................... .... ... ... ............................................. ... .... . 172
14
ZyWALL USG 20/20W User’s Guide
Table of Contents
8.2.3 The Active Sessions Screen .................................................................................... 173
8.2.4 The VPN Status Screen ................................................ ... ... ... .................................. 174
8.2.5 The DHCP Table Screen ..........................................................................................174
8.2.6 The Number of Login Users Screen ................................. ... ... .... ... ... ... .... ... ... ... ....... . 175
Chapter 9
Monitor...................................................................................................................................177
9.1 Overview .......... ... ... ... .... ... ... ... .............................................. ... ... ... ..................................... 177
9.1.1 What Y ou Can Do in this Chapter ............................................................................177
9.2 The Port Statistics Screen ................................................................................................178
9.2.1 The Port Statistics Graph Screen ................. ... ... ... .... ... ... ... ..................................... 180
9.3 Interface Status Screen ..................................................................................................... 181
9.4 The Traffic Statistics Screen ..............................................................................................183
9.5 The Session Monitor Screen .................... ... ... ... .............................................. ... ... ........... 186
9.6 The DDNS Status Screen .................................................................................................. 189
9.7 IP/MAC Binding Monitor ............ ... ............................................. ... ... .... .............................. 189
9.8 The Login Users Screen ................................................................................................... 190
9.9 WLAN Status Screen .........................................................................................................191
9.10 The following table describes the labels in this menu.Cellular Status Screen ................. 192
9.10.1 More Information ............................ ....................................................................... . 194
9.11 USB Storage Screen ........................................................................................................195
9.12 The IPSec Monitor Screen .............................................................................................. 196
9.12.1 Regular Expressions in Searching IPSec SAs ....................................................... 198
9.13 The SSL Connection Monitor Screen ..............................................................................198
9.14 The Content Filter Statistics Screen ................................................................................ 200
9.15 Content Filter Cache Screen ........................................................................................... 202
9.16 The Anti-Spam Statistics Screen ..................................................................................... 204
9.17 The Anti-Spam Status Screen .........................................................................................206
9.18 Log Screen ...................................................................................................................... 207
Chapter 10
Registration...........................................................................................................................211
10.1 Overview ...........................................................................................................................211
10.1.1 What You Can Do in this Chapter ...........................................................................211
10.1.2 What you Need to Know .........................................................................................211
10.2 The Registration Screen .................................................................................................. 212
10.3 The Service Screen ......................................................................................................... 214
Chapter 11
Interfaces...............................................................................................................................217
11.1 Interface Overview ........................................................................................................... 217
11.1.1 What You Can Do in this Chapter ................................ ... ... ... .... .............................. 217
11.1.2 What You Need to Know ........................................................................................ 218
ZyWALL USG 20/20W User’s Guide
15
Table of Contents
11.2 Port Role .................................................................... ... .... ... ........................................... 220
11.3 Ethernet Summary Screen ............................................................................................... 222
11.3.1 Ethernet Edit ..........................................................................................................223
11.3.2 Object References .................................................................................................. 232
11.4 PPP Interfaces ................................................................................................................233
11.4.1 PPP Interface Summary ......................................................................................... 234
11.4.2 PPP Interface Add or Edit ..................................................................................... 2 35
11.5 Cellular Configuration Screen (3G) .................................................................................. 239
11.5.1 Cellular Add/Edit Screen ........................................................................................ 241
11.6 WLAN Interface General Screen ..................................................................................... 248
11.6.1 WLAN Add/Edit Screen .......................................................................................... 252
11.6.2 WLAN Add/Edit: WEP Security .............................................................................. 258
11.6.3 WLAN Add/Edit: WPA-PSK/WPA2-PSK Security ................................................... 259
11.6.4 WLAN Add/Edit: WPA/WPA2 Security .................................................................... 260
11.7 WLAN Interface MAC Filter ............................................................................................. 262
11.8 VLAN Interfaces .............................................................................................................. 264
11.8.1 VLAN Summary Screen ......................................................................................... 266
11.8.2 VLAN Add/Edit ...................................................................................................... 267
11.9 Bridge Interfaces ............................................................................................................. 274
11.9.1 Bridge Summary .....................................................................................................276
11.9.2 Bridge Add/Edit ................................................... .... ... ... ... ... .... .............................. 277
11.9.3 Virtual Interfaces Add/Edit ...................................................................................... 282
11.10 Interface Technical Reference ....................................................................................... 284
Chapter 12
Trunks....................................................................................................................................289
12.1 Overview .......................................................................................................................... 289
12.1.1 What You Can Do in this Chapter .......................................................................... 289
12.1.2 What You Need to Know ........................................................................................ 290
12.2 The Trunk Summary Screen .............................................. ... ... ... ... .................................. 292
12.3 Configuring a Trunk ........................................................................................................ 293
12.4 Trunk Technical Reference .............................................................................................. 295
Chapter 13
Policy and Static Routes......................................................................................................297
13.1 Policy and Static Routes Overview .................................................................................. 297
13.1.1 What You Can Do in this Chapter .......................................................................... 297
13.1.2 What You Need to Know ....................................................................................... 298
13.2 Policy Route Screen ........................................................................................................ 300
13.2.1 Policy Route Edit Screen ....................................................................................... 303
13.3 IP Static Route Screen ....................................................................................................307
13.3.1 Static Route Add/Edit Screen ................................................................................. 308
13.4 Policy Routing Technical Reference ................................................................................ 309
16
ZyWALL USG 20/20W User’s Guide
Table of Contents
Chapter 14
Routing Protocols .................................................................................................................313
14.1 Routing Protocols Overview ............................................................................................ 313
14.1.1 What You Can Do in this Chapter .......................................................................... 313
14.1.2 What You Need to Know ........................................................................................ 313
14.2 The RIP Screen ... ... .... ............................................. ... ... ............................................. ..... 314
14.3 The OSPF Screen ................... ... ... ... ............................................. .... ... ...........................315
14.3.1 Configuring the OSPF Screen .................................. ......... .......... .......... ......... ........ 319
14.3.2 OSPF Area Add/Edit Screen ................................................................................. 322
14.3.3 Virtual Link Add/Edit Screen ................................................................................. 323
14.4 Routing Protocol Technical Reference ............................................................................ 324
Chapter 15
Zones .....................................................................................................................................327
15.1 Zones Overview ............................................................................................................... 327
15.1.1 What You Can Do in this Chapter .......................................................................... 327
15.1.2 What You Need to Know ........................................................................................ 328
15.2 The Zone Screen ................................. .... ... ... ............................................. .... ... ... ...........329
15.3 Zone Edit ........................................................................................................................ 330
Chapter 16
DDNS......................................................................................................................................331
16.1 DDNS Overview .............................................................................................................. 331
16.1.1 What You Can Do in this Chapter .......................................................................... 331
16.1.2 What You Need to Know ........................................................................................ 331
16.2 The DDNS Screen ...........................................................................................................332
16.2.1 The Dynamic DNS Add/Edit Screen ...................................................................... 334
Chapter 17
NAT.........................................................................................................................................337
17.1 NAT Overview .................................................................................................................. 337
17.1.1 What You Can Do in this Chapter .......................................................................... 337
17.1.2 What You Need to Know ........................................................................................ 338
17.2 The NAT Screen ......................................... ............................................. ... .... .................338
17.2.1 The NAT Add/Edit Screen .... ... ... .... ........................................................................ 340
17.3 NAT Technical Reference ................................................................................................ 343
Chapter 18
HTTP Redirect.......................................................................................................................347
18.1 Overview .......................................................................................................................... 347
18.1.1 What You Can Do in this Chapter .......................................................................... 347
18.1.2 What You Need to Know ........................................................................................ 348
18.2 The HTTP Redirect Screen ............................................................................................. 349
ZyWALL USG 20/20W User’s Guide
17
Table of Contents
18.2.1 The HTTP Redirect Edit Screen ............................................................................. 350
Chapter 19
ALG ........................................................................................................................................351
19.1 ALG Overview ................................................................................................................. 351
19.1.1 What You Can Do in this Chapter .......................................................................... 351
19.1.2 What You Need to Know ........................................................................................ 352
19.1.3 Before You Begin ...................................................................................................355
19.2 The ALG Screen ..............................................................................................................355
19.3 ALG Technical Reference ................................................................................................ 357
Chapter 20
IP/MAC Binding.....................................................................................................................359
20.1 IP/MAC Binding Overview ............................................................................................... 359
20.1.1 What You Can Do in this Chapter .......................................................................... 359
20.1.2 What You Need to Know ........................................................................................ 360
20.2 IP/MAC Binding Summary ............................................................................................... 360
20.2.1 IP/MAC Binding Edit ............................................................................................... 361
20.2.2 Static DHCP Edit .................................................................................................... 362
20.3 IP/MAC Binding Exempt List ........................................................................................... 363
Chapter 21
Authentication Policy...........................................................................................................365
21.1 Overview .......................................................................................................................... 365
21.1.1 What You Can Do in this Chapter .......................................................................... 365
21.1.2 What You Need to Know ........................................................................................ 366
21.2 Authentication Policy Screen ........................................................................................... 366
21.2.1 Creating/Editing an Authentication Policy .............................................................. 369
Chapter 22
Firewall...................................................................................................................................373
22.1 Overview .......................................................................................................................... 373
22.1.1 What You Can Do in this Chapter .......................................................................... 373
22.1.2 What You Need to Know ........................................................................................ 374
22.1.3 Firewall Rule Example Applications .................................. .....................................376
22.1.4 Firewall Rule Configuration Example ..................................................................... 379
22.2 The Firewall Screen ................. ... ............................................. ... ... .... .............................. 381
22.2.1 Configuring the Firewall Screen ............................... .............................................. 3 82
22.2.2 The Firewall Add/Edit Screen ................................................................................. 385
22.3 The Session Limit Screen ................................................................................................ 386
22.3.1 The Session Limit Add/Edit Screen ........................................................................ 388
Chapter 23
IPSec VPN..............................................................................................................................391
18
ZyWALL USG 20/20W User’s Guide
Table of Contents
23.1 IPSec VPN Overview .......................................................................................................391
23.1.1 What You Can Do in this Chapter .......................................................................... 391
23.1.2 What You Need to Know ........................................................................................ 392
23.1.3 Before You Begin ...................................................................................................394
23.2 The VPN Connection Screen .......................................................................................... 394
23.2.1 The VPN Connection Add/Edit (IKE) Screen ......................................................... 396
23.2.2 The VPN Connection Add/Edit Manual Key Screen .............................................. 403
23.3 The VPN Gateway Screen .............................................................................................. 406
23.3.1 The VPN Gateway Add/Edit Screen ...................................................................... 407
23.4 IPSec VPN Background Information ............................................................................... 415
Chapter 24
SSL VPN.................................................................................................................................427
24.1 Overview .......................................................................................................................... 427
24.1.1 What You Can Do in this Chapter .......................................................................... 427
24.1.2 What You Need to Know ........................................................................................ 427
24.2 The SSL Access Privilege Screen ................................................................................... 429
24.2.1 The SSL Access Policy Add/Edit Screen .............................................................. 430
24.3 The SSL Global Setting Screen ............... ... ... ... .... ... ... ............................................. ... .... . 433
24.3.1 How to Upload a Custom Logo .............................................................................. 434
24.4 Establishing an SSL VPN Connection ............................................................................. 435
Chapter 25
SSL User Screens................................................................................................................437
25.1 Overview .......................................................................................................................... 437
25.1.1 What You Need to Know ........................................................................................ 437
25.2 Remote User Login ..........................................................................................................438
25.3 The SSL VPN User Screens ................................................ ........................................... 443
25.4 Bookmarking the ZyWALL ............................................................................................... 444
25.5 Logging Out of the SSL VPN User Screens ....................................................................444
Chapter 26
SSL User Application Screens ............................................................................................447
26.1 SSL User Application Screens Overview ........................................................................ 447
26.2 The Application Screen ...................................................................................................447
Chapter 27
ZyWALL SecuExtender.........................................................................................................449
27.1 The ZyWALL SecuExtender Icon .................................................................................... 449
27.2 Statistics .......................................................................................................................... 450
27.3 View Log ..........................................................................................................................451
27.4 Suspend and Resume the Connection ....................... ..................................................... 451
27.5 Stop the Connection ........................................................................................................452
ZyWALL USG 20/20W User’s Guide
19
Table of Contents
27.6 Uninstalling the ZyWALL SecuExtender .......................................................................... 452
Chapter 28
Bandwidth Management.....................................................................................................453
28.1 Overview .......................................................................................................................... 453
28.1.1 What You Can Do in this Chapter .......................................................................... 453
28.1.2 What You Need to Know ....................................................................................... 453
28.1.3 Bandwidth Management Examples ................................ ................... .................... . 457
28.2 TheBandwidth Management Screen ............................................................................... 461
28.2.1 The Bandwidth Management Add/Edit Screen .............. ... ..................................... 463
Chapter 29
ADP ........................................................................................................................................467
29.1 Overview .......................................................................................................................... 467
29.1.1 ADP ........................................................................................................................ 467
29.1.2 What You Can Do in this Chapter ......................................................................... 467
29.1.3 What You Need To Know ....................................................................................... 467
29.1.4 Before You Begin ...................................................................................................468
29.2 The ADP General Screen ........................ ................................................... ..................... 469
29.3 The Profile Summary Screen .......................................................................................... 470
29.3.1 Base Profiles ..........................................................................................................471
29.3.2 Configuring The ADP Profile Summary Screen ..................................................... 471
29.3.3 Creating New ADP Profiles ............................ ........................................................ 472
29.3.4 Traffic Anomaly Profiles ........................................................................................ 472
29.3.5 Protocol Anomaly Profiles .................................................................................... . 475
29.3.6 Protocol Anomaly Configuration ............................................................................. 475
29.4 ADP Technical Reference ................................................................................................ 479
Chapter 30
Content Filtering...................................................................................................................487
30.1 Overview .......................................................................................................................... 487
30.1.1 What You Can Do in this Chapter .......................................................................... 487
30.1.2 What You Need to Know ........................................................................................ 487
30.1.3 Before You Begin ...................................................................................................489
30.2 Content Filter General Screen .................... ....................................................... ..............489
30.3 Content Filter Policy Add or Edit Screen ......................................................................... 492
30.4 Content Filter Profile Screen .......................................................................................... 494
30.5 Content Filter Categories Screen ................................................................................... 494
30.5.1 Content Filter Blocked and Warning Messages ..................................................... 508
30.6 Content Filter Customization Screen .............................................................................. 508
30.7 Content Filter Technical Reference ..................................................................................511
Chapter 31
Content Filter Reports..........................................................................................................513
20
ZyWALL USG 20/20W User’s Guide
Table of Contents
31.1 Overview .......................................................................................................................... 513
31.2 Viewing Content Filter Reports ............................................. ........................................... 5 13
Chapter 32
Anti-Spam..............................................................................................................................521
32.1 Overview .......................................................................................................................... 521
32.1.1 What You Can Do in this Chapter .......................................................................... 521
32.1.2 What You Need to Know ........................................................................................ 521
32.2 Before You Begin ............................................................................................................. 523
32.3 The Anti-Spam General Screen ....................................................................................... 523
32.3.1 The Anti-Spam Policy Add or Edit Screen ................................................ .............. 525
32.4 The Anti-Spam Black List Screen .................................................................................... 527
32.4.1 The Anti-Spam Black or White List Add/Edit Screen ...................................... ... .... . 529
32.4.2 Regular Expressions in Black or White List Entries ...............................................530
32.5 The Anti-Spam White List Screen .................................................................................... 531
32.6 The DNSBL Screen ......................................................................................................... 532
32.7 Anti-Spam Technical Reference ...................................................................................... 534
Chapter 33
User/Group............................................................................................................................539
33.1 Overview .......................................................................................................................... 539
33.1.1 What You Can Do in this Chapter .......................................................................... 539
33.1.2 What You Need To Know ....................................................................................... 539
33.2 User Summary Screen .................................................................................................... 542
33.2.1 User Add/Edit Screen ........................... .......... .......... ......... ....... ......... .......... .......... . 542
33.3 User Group Summary Screen ......................................................................................... 545
33.3.1 Group Add/Edit Screen .......................................................................................... 546
33.4 Setting Screen ................................................................................................................ 547
33.4.1 Default User Authentication Timeout Settings Edit Screens .................................. 550
33.4.2 User Aware Login Example ............... ... ... .............................................. ... ... ... ........552
33.5 User /Group Technical Reference ................................................................................... 553
Chapter 34
Addresses..............................................................................................................................555
34.1 Overview .......................................................................................................................... 555
34.1.1 What You Can Do in this Chapter .......................................................................... 555
34.1.2 What You Need To Know ....................................................................................... 555
34.2 Address Summary Screen ....................... ........................................................................ 555
34.2.1 Address Add/Edit Screen ....................................................................................... 557
34.3 Address Group Summary Screen ............................... ....................... ...................... ........ 558
34.3.1 Address Group Add/Edit Screen ............................................................................ 559
Chapter 35
Services.................................................................................................................................561
ZyWALL USG 20/20W User’s Guide
21
Table of Contents
35.1 Overview .......................................................................................................................... 561
35.1.1 What You Can Do in this Chapter .......................................................................... 561
35.1.2 What You Need to Know ........................................................................................ 561
35.2 The Service Summary Screen ....................... .......................... .......................... .............. 562
35.2.1 The Service Add/Edit Screen ............................ ..................................................... 564
35.3 The Service Group Summary Screen ........................ ....... ... ... ... ... .... ... ... ... .... ... ... ... ... .... . 564
35.3.1 The Service Group Add/Edit Screen ...................................................................... 566
Chapter 36
Schedules..............................................................................................................................567
36.1 Overview .......................................................................................................................... 567
36.1.1 What You Can Do in this Chapter .......................................................................... 567
36.1.2 What You Need to Know ........................................................................................ 567
36.2 The Schedule Summary Screen ...................................................................................... 568
36.2.1 The One-Time Schedule Add/Edit Screen ............................................................. 569
36.2.2 The Recurring Schedule Add/Edit Screen ............................................ ... ... ... ... .... . 570
Chapter 37
AAA Server............................................................................................................................573
37.1 Overview .......................................................................................................................... 573
37.1.1 Directory Service (AD/LDAP) ................................................................ ................. 573
37.1.2 RADIUS Server ...................................................................................................... 574
37.1.3 ASAS ......................................................................................................................574
37.1.4 What You Can Do in this Chapter .......................................................................... 574
37.1.5 What You Need To Know ....................................................................................... 575
37.2 Active Directory or LDAP Server Summary ..................................................................... 577
37.2.1 Adding an Active Directory or LDAP Server ............. ............ ............. ............. ........ 577
37.3 RADIUS Server Summary ............................................................................................... 579
37.3.1 Adding a RADIUS Server ...................................................................................... 581
Chapter 38
Authentication Method.........................................................................................................583
38.1 Overview .......................................................................................................................... 583
38.1.1 What You Can Do in this Chapter .......................................................................... 583
38.1.2 Before You Begin ...................................................................................................583
38.1.3 Example: Selecting a VPN Authentication Method ................................................ 583
38.2 Authentication Method Objects ...................................... ................................. ................. 584
38.2.1 Creating an Authentication Method Object ........................................... ................. 585
Chapter 39
Certificates ............................................................................................................................589
39.1 Overview .......................................................................................................................... 589
39.1.1 What You Can Do in this Chapter .......................................................................... 589
22
ZyWALL USG 20/20W User’s Guide
Table of Contents
39.1.2 What You Need to Know ........................................................................................ 589
39.1.3 Verifying a Certificate ............................................................................................. 591
39.2 The My Certificates Screen ............................................................................................. 593
39.2.1 The My Certificates Add Screen ............................................................................ 594
39.2.2 The My Certificates Edit Screen ..................................................... ... .... ... .............. 599
39.2.3 The My Certificates Import Screen ........................................................................ 602
39.3 The Trusted Certificates Screen ..................................................................................... 603
39.3.1 The Trusted Certificates Edit Screen .................................................................... 604
39.3.2 The Trusted Certificates Import Screen ................................................................ 608
39.4 Certificates Technical Reference ..................................................................................... 609
Chapter 40
ISP Accounts.........................................................................................................................611
40.1 Overview ...........................................................................................................................611
40.1.1 What You Can Do in this Chapter ...........................................................................611
40.2 ISP Account Summary .....................................................................................................611
40.2.1 ISP Account Edit ................................................................................................... 612
Chapter 41
SSL Application ....................................................................................................................615
41.1 Overview .......................................................................................................................... 615
41.1.1 What You Can Do in this Chapter .......................................................................... 615
41.1.2 What You Need to Know ........................................................................................ 615
41.1.3 Example: Specifying a Web Site for Access .......................................................... 616
41.2 The SSL Application Screen ............................. .... ... ... ... .... ... ...... ... .... ... ... ... .... ... ... ... ... .... . 617
41.2.1 Creating/Editing a Web-based SSL Application Object ......................................... 618
Chapter 42
Endpoint Security.................................................................................................................621
42.1 Overview .......................................................................................................................... 621
42.1.1 What You Can Do in this Chapter .......................................................................... 622
42.1.2 What You Need to Know ........................................................................................ 622
42.2 Endpoint Security Screen ........ ... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ...... .... ... ... ... .... ... ... ... ... .... . 623
42.3 Endpoint Security Add/Edit .............................................................................................. 624
Chapter 43
System...................................................................................................................................629
43.1 Overview .......................................................................................................................... 629
43.1.1 What You Can Do in this Chapter .......................................................................... 629
43.2 Host Name ....................................................................................................................... 630
43.3 USB Storage .................................................................................................................... 631
43.4 Date and Time ................................................................................................................. 631
43.4.1 Pre-defined NTP Time Servers List ............................................. ... ... .... ... ... ........... 634
ZyWALL USG 20/20W User’s Guide
23
Table of Contents
43.4.2 Time Server Synchronization ................................................................................. 635
43.5 Console Port Speed ......................................................................................................... 636
43.6 DNS Overview ................................................................................................................. 636
43.6.1 DNS Server Address Assignment .......................................................................... 637
43.6.2 Configuring the DNS Screen ................................ .......................................... ........ 637
43.6.3 Address Record .................................................................................................... 640
43.6.4 PTR Record ........................................................................................................... 640
43.6.5 Adding an Address/PTR Record ............................................................................ 640
43.6.6 Domain Zone Forwarder .................. ... ... .... ... ............................................. ... ... .....641
43.6.7 Adding a Domain Zone Forwarder .............................. ........................................... 641
43.6.8 MX Record ............................................................................................................642
43.6.9 Adding a MX Record ..............................................................................................643
43.6.10 Adding a DNS Service Control Rule .................................................................... 643
43.7 WWW Overview ..............................................................................................................644
43.7.1 Service Access Limitations .................................................................................... 644
43.7.2 System Timeout ..................................................................................................... 645
43.7.3 HTTPS ...................................................................................................................645
43.7.4 Configuring WWW Service Control ........................................................................ 646
43.7.5 Service Control Rules ............................................................................................ 650
43.7.6 Customizing the WWW Login Page ....................................................................... 650
43.7.7 HTTPS Example ....................................................................................................654
43.8 SSH .............................................................................................................................. 661
43.8.1 How SSH Works ...................................................... ... ... ... ... .... ... ... ........................ 662
43.8.2 SSH Implementation on the ZyWALL ..................................................................... 663
43.8.3 Requirements for Using SSH ................................................................................. 663
43.8.4 Configuring SSH ....................................................................................................663
43.8.5 Secure Telnet Using SSH Examples ...................................................................... 665
43.9 Telnet .............................................................................................................................. 666
43.9.1 Configuring Telnet .................................................................................................. 667
43.10 FTP ...............................................................................................................................668
43.10.1 Configuring FTP ................................................................................................... 668
43.11 SNMP ....................................... ... ... ... .............................................. ... ... ........................ 670
43.11.1 Supported MIBs ............... ... ... ... .............................................. ... ... ........................ 672
43.11.2 SNMP Traps .......................... ... .... ... ............................................. ... .... ... .............. 672
43.11.3 Configuring SNMP .............. ... ... .... ............................................. ... ... ..................... 672
43.12 Vantage CNM ...............................................................................................................674
43.12.1 Configuring Vantage CNM ................................................................................... 675
43.13 Language Screen .........................................................................................................677
Chapter 44
Log and Report .....................................................................................................................679
44.1 Overview .......................................................................................................................... 679
44.1.1 What You Can Do In this Chapter .......................................................................... 679
24
ZyWALL USG 20/20W User’s Guide
Table of Contents
44.2 Email Daily Report ..........................................................................................................679
44.3 Log Setting Screens .......................................................................................................681
44.3.1 Log Setting Summary ............................................................................................. 682
44.3.2 Edit System Log Settings ......................................................................................683
44.3.3 Edit Remote Server Log Settings ..........................................................................688
44.3.4 Active Log Summary Screen ............................. ............. ............. ............. ............. . 690
Chapter 45
File Manager..........................................................................................................................693
45.1 Overview .......................................................................................................................... 693
45.1.1 What You Can Do in this Chapter .......................................................................... 693
45.1.2 What you Need to Know ........................................................................................ 693
45.2 The Configuration File Screen .............................. ...................................................... .....696
45.3 The Firmware Package Screen ...................................................................................... 700
45.4 The Shell Script Screen .......................... ....................................................... .................702
Chapter 46
Diagnostics..........................................................................................................................705
46.1 Overview .......................................................................................................................... 705
46.1.1 What You Can Do in this Chapter .......................................................................... 705
46.2 The Diagnostic Screen ....................................................................................................705
46.2.1 The Diagnostics Files Screen ................................................................................ 706
46.3 The Packet Capture Screen ............................................................................................ 707
46.3.1 The Packet Capture Files Screen .......................................................................... 710
46.3.2 Example of Viewing a Packet Capture File ................................. ... ... .... ... ... ... ... ......711
46.4 Core Dump Screen ..........................................................................................................712
46.4.1 Core Dump Files Screen ......................... .......................................... ..................... 713
46.5 The System Log Screen .................................................................................................. 714
Chapter 47
Packet Flow Explore.............................................................................................................715
47.1 Overview .......................................................................................................................... 715
47.1.1 What You Can Do in this Chapter .......................................................................... 715
47.2 The Routing Status Screen ............................................................ ....................... ........... 715
47.3 The SNAT Status Screen ................................................................................................. 719
Chapter 48
Reboot....................................................................................................................................723
48.1 Overview .......................................................................................................................... 723
48.1.1 What You Need To Know ....................................................................................... 723
48.2 The Reboot Screen .........................................................................................................723
Chapter 49
Shutdown...............................................................................................................................725
ZyWALL USG 20/20W User’s Guide
25
Table of Contents
49.1 Overview .......................................................................................................................... 725
49.1.1 What You Need To Know ....................................................................................... 725
49.2 The Shutdown Screen ..................................................................................................... 725
Chapter 50
Troubleshooting....................................................................................................................727
50.1 Resetting the ZyWALL .....................................................................................................738
50.2 Getting More Troubleshooting Help ................................................................................. 739
Chapter 51
Product Specifications.........................................................................................................741
51.1 Power Adaptor Specifications ..........................................................................................745
Appendix A Log Descriptions...............................................................................................747
Appendix B Common Services.............................................................................................799
Appendix C Wireless LANs..................................................................................................803
Appendix D Importing Certificates........................................................................................819
Appendix E Open Software Announcements.......................................................................845
Appendix F Legal Information ..............................................................................................935
Index.......................................................................................................................................939
26
ZyWALL USG 20/20W User’s Guide
PART I

User’s Guide

27
28
CHAPTER 1

Introducing the ZyWALL

This chapter gives an overview of the ZyWALL. It explains the front panel ports, LEDs, introduces the management methods, and lists different ways to start or stop the ZyWALL.

1.1 Overview and Key Default Settings

The ZyWALL is a comprehensive security device. Its flexible configuration helps network administrators set up the network and enforce security policies efficiently. In addition, the ZyWALL provides excellent throughput, making it an ideal solution for reliable, secure service.
The ZyWALL’s security features include VPN, firewall, content filtering, ADP (Anomaly Detection and Protection), and certificates. It also provides bandwidth management, Instant Messaging (IM) and Peer to Peer (P2P) control, NAT, port forwarding, policy routing, DHCP server and many other powerful features. Flexible configuration helps you set up the network and enforce security policies efficiently. See Chapter 2 on page 37 for a more detailed overview of the ZyWALL’s features.
The ZyWALL provides excellent throughput with the reliability of dual WAN Gigabit Ethernet ports and load balancing. You can also use a 3G cellular USB (not included) for a third WAN connection.
The ZyWALL lets you set up multiple networks for your company. The De­Militarized Zone (DMZ) increases LAN security by providing separate ports for connecting publicly accessible servers. The ZyWALL also provides two separate LAN networks. You can set ports to be part of the LAN1, WLAN, or DMZ. Alternatively, you can deploy the ZyWALL as a transparent firewall in an existing network with minimal configuration.

1.2 Wall-mounting

Do the following to attach your ZyWALL to a wall.
ZyWALL USG 20/20W User’s Guide
29
Chapter 1 Introducing the ZyWALL
USG 20
1 Screw the two screws provided with your ZyWALL into the wall 150 mm apart (see
the figure in step 2). Use screws with 6 mm ~ 8 mm (0.24" ~ 0.31") wide heads. Do not screw the screws all the way in to the wall; leave a small gap between the head of the screw and the wall.
The gap must be big enough for the screw heads to slide into the screw slots and the connection cables to run down the back of the ZyWALL.
Note: Make sure the screws are securely fixed to the wall and strong enough to hold
the weight of the ZyWALL with the connection cables.
2 Align the holes on the back of the ZyWALL with the screws on the wall. Hang
the ZyWALL on the screws.
30
ZyWALL USG 20/20W User’s Guide
Chapter 1 Introducing the ZyWALL
USG 20W
The ZyWALL should be wall-mounted horizontally. The ZyWALL's side panels with ventilation slots should not be facing up or down as this position is less safe.
ZyWALL USG 20/20W User’s Guide
31
Chapter 1 Introducing the ZyWALL
ZyWALL USG 20
ZyWALL USG 20W

1.3 Front Panel

This section introduces the ZyWALL’s front panel.
Figure 1 ZyWALL Front Panel
1.3.1 Front Panel LEDs
The following table describes the LEDs.
Table 1 Front Panel LEDs
LED COLOR STATUS DESCRIPTION
PWR Off The ZyWALL is turned off.
Green On The ZyWALL is turned on.
Red On There is a hardware component failure. Shut down
SYS Green Off The ZyWALL is not ready or has failed.
Red On The ZyWALL had an error or has failed.
Breathing The ZyWALL is in power saving mode.
the device, wait for a few minutes and then restart the device (see Section 1.5 on page 34). If the LED turns red again, then please contact your vendor.
On The ZyWALL is ready and running.
Blinking The ZyWALL is booting.
32
ZyWALL USG 20/20W User’s Guide
Chapter 1 Introducing the ZyWALL
Table 1 Front Panel LEDs (continued)
LED COLOR STATUS DESCRIPTION
USB Green Off No device is connected to the ZyWALL’s USB port or
the connected device is not supported by the ZyWALL.
On A 3G USB card or a USB storage device is connected
to the ZyWALL’s USB port.
Orange On The ZyWALL is connected to a 3G network through
the connected 3G USB card.
WLAN (20W Only)
P1~P5 Green Off There is no traffic on this port.
Green Off The wireless function is disabled on the ZyWALL.
On The wireless function is enabled on the ZyWALL.
Blinking The ZyWALL is sending or receiving packets on this
port.
Orange Off There is no connection on this port.
On This port has a successful link.

1.4 Management Overview

You can use the following ways to manage the ZyWALL.
Web Configurator
The Web Configurator allows easy ZyWALL setup and management using an Internet browser. This User’s Guide provides information about the Web Configurator.
Figure 2 Managing the ZyWALL: Web Configurator
Command-Line Interface (CLI)
The CLI allows you to use text-based commands to configure the ZyWALL. You can access it using remote management (for example, SSH or Telnet) or via the
ZyWALL USG 20/20W User’s Guide
33
Chapter 1 Introducing the ZyWALL
console port. See the Command Reference Guide for more information about the CLI.
Console Port
You can use the console port to manage the ZyWALL using CLI commands. See the Command Reference Guide for more information about the CLI.
The default settings for the console port are as follows.
Table 2 Console Port Default Settings
SETTING VALUE
Speed 115200 bps
Data Bits 8
Parity None
Stop Bit 1
Flow Control Off

1.5 Starting and Stopping the ZyWALL

Here are some of the ways to start and stop the ZyWALL.
Always use Maintenance > Shutdown > Shut down or the shutdown command before you turn off the ZyWALL or remove the power. Not doing so can cause the firmware to become corrupt.
Table 3 Starting and Stopping the ZyWALL
METHOD DESCRIPTION
Turn i n g on the power
Rebooting the ZyWALL
Using the RESET button
A cold start occurs when you turn on the power to the ZyWALL. The ZyWALL powers up, checks the hardware, and starts the system processes.
A warm start (without powering down and powering up again) occurs when you use the Reboot button in the Reboot screen or when you use the reboot command. The ZyWALL writes all cached data to the local storage, stops the system processes, and then does a warm start.
If you press the RESET button, the ZyWALL sets the configuration to its default values and then reboots.
34
ZyWALL USG 20/20W User’s Guide
Chapter 1 Introducing the ZyWALL
Table 3 Starting and Stopping the ZyWALL
METHOD DESCRIPTION
Clicking
Maintenance > Shutdown > Shutdown or
using the shutdown command
Disconnecting the power
The ZyWALL does not stop or start the system processes when you apply configuration files or run shell scripts although you may temporarily lose access to network resources.
Clicking Maintenance > Shutdown > Shutdown or using the shutdown command writes all cached data to the local storage and stops the system processes. Wait for the device to shut down and then manually turn off or remove the power. It does not turn off the power.
Power off occurs when you turn off the power to the ZyWALL. The ZyWALL simply turns off. It does not stop the system processes or write cached data to local storage.
ZyWALL USG 20/20W User’s Guide
35
Chapter 1 Introducing the ZyWALL
36
ZyWALL USG 20/20W User’s Guide
CHAPTER 2

Features and Applications

This chapter introduces the main features and applications of the ZyWALL.

2.1 Features

The ZyWALL’s security features include VPN, firewallcontent filtering, ADP (Anomaly Detection and Protection), and certificates. It also provides bandwidth management, NAT, port forwarding, policy routing, DHCP server and many other powerful features.
The rest of this section provides more information about the features of the ZyWALL.
High Availability
To ensure the ZyWALL provides reliable, secure Internet access, set up one or more of the following:
• Multiple WAN ports and configure load balancing between these ports.
• One or more 3G (cellular) connections.
Virtual Private Networks (VPN)
Use IPSec, SSL to provide secure communication between two sites over the Internet or any insecure network that uses TCP/IP for communication. The ZyWALL also offers hub-and-spoke IPSec VPN.
Flexible Security Zones
Many security settings are made by zone, not by interface, port, or network. As a result, it is much simpler to set up and to change security settings in the ZyWALL. You can create your own custom zones. You can add interfaces and VPN tunnels to zones.
ZyWALL USG 20/20W User’s Guide
37
Chapter 2 Features and Applications
Firewall
The ZyWALL’s firewall is a stateful inspection firewall. The ZyWALL restricts access by screening data packets against defined access rules. It can also inspect sessions. For example, traffic from one zone is not allowed unless it is initiated by a computer in another zone first.
Anomaly Detection and Prevention (ADP)
ADP (Anomaly Detection and Prevention) can detect malicious or suspicious packets and respond instantaneously. It can detect:
• Anomalies based on violations of protocol standards (RFCs – Requests for Comments)
• Abnormal flows such as port scans.
The ZyWALL’s ADP protects against network-based intrusions. See Section 29.3.4
on page 472 and Section 29.3.5 on page 475 for more on the kinds of attacks that
the ZyWALL can protect against. You can also create your own custom ADP rules.
Bandwidth Management
Bandwidth management allows you to allocate network resources according to defined policies. This policy-based bandwidth allocation helps your network to better handle applications such as Internet access, e-mail, Voice-over-IP (VoIP), video conferencing and other business-critical applications.
Content Filter
Content filtering allows schools and businesses to create and enforce Internet access policies tailored to the needs of the organization.
You can also subscribe to category-based content filtering that allows your ZyWALL to check web sites against an external database of dynamically-updated ratings of millions of web sites. You then simply select categories to block or monitor, such as pornography or racial intolerance, from a pre-defined list.
Anti-Spam
The anti-spam feature can mark or discard spam. Use the white list to identify legitimate e-mail. Use the black list to identify spam e-mail. The ZyWALL can also check e-mail against a DNS black list (DNSBL) of IP addresses of servers that are suspected of being used by spammers.
38
ZyWALL USG 20/20W User’s Guide

2.2 Applications

These are some example applications for your ZyWALL. See also Chapter 7 on
page 107 for configuration tutorial examples.
2.2.1 VPN Connectivity
Set up VPN tunnels with other companies, branch offices, telecommuters, and business travelers to provide secure access to your network. You can also set up additional connections to the Internet to provide better service.
Figure 3 Applications: VPN Connectivity
Chapter 2 Features and Applications
2.2.2 SSL VPN Network Access
You can configure the ZyWALL to provide SSL VPN network access to remote users.
ZyWALL USG 20/20W User’s Guide
39
Chapter 2 Features and Applications
Web Mail File Share
Web-based Application
https;//
Application Server
Non-Web
LAN (192.168.1.X)
192.168.1.100
2.2.2.1 Full Tunnel Mode
In full tunnel mode, a virtual connection is created for remote users with private IP addresses in the same subnet as the local network. This allows them to access network resources in the same way as if they were part of the internal network.
Figure 4 Network Access Mode: Full Tunnel Mode
40
ZyWALL USG 20/20W User’s Guide
2.2.3 User-Aware Access Control
Set up security policies that restrict access to sensitive information and shared resources based on the user who is trying to access it.
Figure 5 Applications: User-Aware Access Control
Chapter 2 Features and Applications
ZyWALL USG 20/20W User’s Guide
41
Chapter 2 Features and Applications
42
ZyWALL USG 20/20W User’s Guide
CHAPTER 3

Web Configurator

The ZyWALL Web Configurator allows easy ZyWALL setup and management using an Internet browser.

3.1 Web Configurator Requirements

In order to use the Web Configurator, you must
• Use Internet Explorer 7 or later, or Firefox 1.5 or later
• Allow pop-up windows (blocked by default in Windows XP Service Pack 2)
• Enable JavaScripts (enabled by default)
• Enable Java permissions (enabled by default)
• Enable cookies
The recommended screen resolution is 1024 x 768 pixels.

3.2 Web Configurator Access

1 Make sure your ZyWALL hardware is properly connected. See the Quick Start
Guide.
ZyWALL USG 20/20W User’s Guide
43
Chapter 3 Web Configurator
2 Open your web browser, and go to http://192.168.1.1. By default, the ZyWALL
automatically routes this request to its HTTPS server, and it is recommended to keep this setting. The Login screen appears.
Figure 6 Login Screen
3 Type the user name (default: “admin”) and password (default: “1234”).
If your account is configured to use an ASAS authentication server, use the OTP (One-Time Password) token to generate a number. Enter it in the One-Time Password field. The number is only good for one login. You must use the token to generate a new number the next time you log in.
4 Click Login. If you logged in using the default user name and password, the
Update Admin Info screen (Figure 7 on page 44) appears. Otherwise, the
dashboard (Figure 8 on page 45) appears.
Figure 7 Update Admin Info Screen
44
ZyWALL USG 20/20W User’s Guide
Chapter 3 Web Configurator
A
C
B
5 The screen above appears every time you log in using the default user name and
default password. If you change the password for the default user account, this screen does not appear anymore.
Follow the directions in this screen. If you change the default password, the Login screen (Figure 6 on page 44) appears after you click Apply. If you click Ignore, the Installation Setup Wizard opens if the ZyWALL is using its default configuration (see Chapter 4 on page 59); otherwise the dashboard appears as shown next.
Figure 8 Dashboard

3.3 Web Configurator Screens Overview

The Web Configurator screen is divided into these parts (as illustrated in Figure 8
on page 45):
A - title bar
B - navigation panel
C - main window
ZyWALL USG 20/20W User’s Guide
45
Chapter 3 Web Configurator
3.3.1 Title Bar
The title bar provides some icons in the upper right corner.
Figure 9 Title Bar
The icons provide the following functions.
Table 4 Title Bar: Web Configurator Icons
LABEL DESCRIPTION
Logout Click this to log out of the Web Configurator.
Help Click this to open the help page for the current screen.
About Click this to display basic information about the ZyWALL.
Site Map Click this to see an overview of links to the Web Configurator screens.
Object Reference
Console Click this to open the console in which you can use the command line
CLI Click this to open a popup window that displays the CLI commands sent
Click this to open a screen where you can check which configuration items reference an object.
interface (CLI). See the CLI Reference Guide for details on the commands.
by the Web Configurator.
3.3.1.1 About
Click this to display basic information about the ZyWALL.
Figure 10 Title Bar
46
ZyWALL USG 20/20W User’s Guide
The following table describes labels that can appear in this screen.
Table 5 Title Bar: Web Configurator Icons
LABEL DESCRIPTION
Boot Module This shows the version number of the software that handles the booting
process of the ZyWALL.
Current Version
Released Date This shows the date (yyyy-mm-dd) and time (hh:mm:ss) when the
OK Click this to close the screen.
This shows the firmware version of the ZyWALL.
firmware is released.
3.3.2 Navigation Panel
Use the menu items on the navigation panel to open screens to configure ZyWALL features. Click the arrow in the middle of the right edge of the navigation panel to hide the navigation panel menus or drag it to resize them. The following sections introduce the ZyWALL’s navigation panel menus and their screens.
Chapter 3 Web Configurator
Figure 11 Navigation Panel
3.3.2.1 Dashboard
The dashboard displays general device information, system status, system resource usage, licensed service status, and interface status in widgets that you can re-arrange to suit your needs. See Chapter 8 on page 165 for details on the dashboard.
ZyWALL USG 20/20W User’s Guide
47
Chapter 3 Web Configurator
3.3.2.2 Monitor Menu
The monitor menu screens display status and statistics information.
Table 6 Monitor Menu Screens Summary
FOLDER OR LINK TAB FUNCTION
System Status
Port Statistics Displays packet statistics for each physical port.
Interface Status Displays general interface information and packet
Traffic Statistics Collect and display traffic statistics.
Session Monitor Displays the status of all current sessions.
DDNS Status Displays the status of the ZyWALL’s DDNS domain names.
IP/MAC Binding Lists the devices that have received an IP address from
Login Users Lists the users currently logged into the ZyWALL.
WLAN Status (For USG 20W only) Displays the connection status of the
Cellular Status Displays details about the ZyWALL’s 3G connection status.
VPN Monitor
IPSec Displays and manages the active IPSec SAs.
SSL Lists users currently logged into the VPN SSL client portal.
Anti-X Statistics
Content Filter Report Collect and display content filter statistics
Anti-Spam Report Collect and display spam statistics.
Log Lists log entries.
statistics.
ZyWALL interfaces using IP/MAC binding.
ZyWALL’s wireless clients.
You can also log out individual users and delete related session information.
Cache Manage the ZyWALL’s URL cache.
Status Displays how many mail sessions the ZyWALL is currently
checking and DNSBL (Domain Name Service-based spam Black List) statistics.
3.3.2.3 Configuration Menu
Use the configuration menu screens to configure the ZyWALL’s features.
Table 7 Configuration Menu Screens Summary
FOLDER OR LINK
Quick Setup Quickly configure WAN interfaces or VPN
Licensing
Registration Registration Register the device and activate trial services.
TAB FUNCTION
Service View the licensed service status and upgrade
48
connections.
licensed services.
ZyWALL USG 20/20W User’s Guide
Chapter 3 Web Configurator
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR LINK
Interface Port Role Use this screen to set the ZyWALL’s flexible ports
Routing Policy Route Create and manage routing policies.
Zone Configure zones used to define various policies.
DDNS Profile Define and manage the ZyWALL’s DDNS domain
NAT Set up and manage port forwarding rules.
HTTP Redirect Set up and manage HTTP redirection rules.
ALG Configure SIP, H.323, and FTP pass-through
IP/MAC Binding
Auth. Policy Define rules to force user authentication.
Firewall Firewall Create and manage level-3 traffic rules.
VPN
IPSec VPN VPN Connection Configure IPSec tunnels.
SSL VPN Access Privilege Configure SSL VPN access rights for users and
TAB FUNCTION
as LAN1 or DMZ.
Ethernet Manage Ethernet interfaces and virtual Ethernet
interfaces.
PPP Create and manage PPPoE and PPTP interfaces.
Cellular Configure a cellular Internet connection for an
installed 3G card.
WLAN (For USG 20W only) Configure settings for an
installed wireless LAN card.
VLAN Create and manage VLAN interfaces and virtual
VLAN interfaces.
Bridge Create and manage bridges and virtual bridge
interfaces.
Trunk Create and manage trunks (groups of interfaces)
for load balancing and link High Availability (HA).
Static Route Create and manage IP static routing information.
RIP Configure device-level RIP settings.
OSPF Configure device-level OSPF settings, including
areas and virtual links.
names.
settings.
Summary Configure IP to MAC address bindings for devices
connected to each supported interface.
Exempt List Configure ranges of IP addresses to which the
ZyWALL does not apply IP/MAC binding.
Session Limit Limit the number of concurrent client NAT/firewall
sessions.
VPN Gateway Configure IKE tunnels.
groups.
Global Setting Configure the ZyWALL’s SSL VPN settings that
apply to all connections.
ZyWALL USG 20/20W User’s Guide
49
Chapter 3 Web Configurator
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR LINK
BWM
Anti-X
ADP General Display and manage ADP bindings.
Content Filter General Create and manage content filter policies.
Anti-Spam General Turn anti-spam on or off and manage anti-spam
Object
User/Group User Create and manage users.
Address Address Create and manage host, range, and network
Service Service Create and manage TCP and UDP services.
Schedule Create one-time and recurring schedules.
AAA Server Active Directory-
Auth. Method Create and manage ways of authenticating users.
Certificate My Certificates Create and manage the ZyWALL’s certificates.
ISP Account Create and manage ISP account information for
SSL Application
TAB FUNCTION
Profile Create and manage ADP profiles.
Filter Profile Create and manage the detailed filtering rules for
content filtering policies.
policies.
Black/White List Set up a black list to identify spam and a white list
to identify legitimate e-mail.
DNSBL Have the ZyWALL check e-mail against DNS Black
Lists.
Group Create and manage groups of users.
Setting Manage default settings for all users, general
settings for user sessions, and rules to force user authentication.
(subnet) addresses.
Address Group Create and manage groups of addresses.
Service Group Create and manage groups of services.
Configure the default Active Directory settings.
Default
Active Directory­Group
LDAP-Default Configure the default LDAP settings.
LDAP-Group Create and manage groups of LDAP servers.
RADIUS-Default Configure the default RADIUS settings.
RADIUS-Group Create and manage groups of RADIUS servers.
Trusted Certificates
Create and manage groups of Active Directory servers.
Import and manage certificates from trusted sources.
PPPoE/PPTP interfaces.
Create SSL web application objects.
50
ZyWALL USG 20/20W User’s Guide
Chapter 3 Web Configurator
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR LINK
Endpoint Security
System
Host Name Configure the system and domain name for the
USB Storage Configure the settings for the connected USB
Date/Time Configure the current date, time, and time zone in
Console Speed
DNS Configure the DNS server and address records for
WWW Service Control Configure HTTP, HTTPS, and general
SSH Configure SSH server and SSH service settings.
TELNET Configure telnet server settings for the ZyWALL.
FTP Configure FTP server settings.
SNMP Configure SNMP communities and services.
Vantage CNM Configure and allow your ZyWALL to be managed
Language Select the Web Configurator language.
Log & Report
Email Daily Report
Log Setting Configure the system log, e-mail logs, and remote
TAB FUNCTION
Create Endpoint Security (EPS) objects.
ZyWALL.
devices.
the ZyWALL.
Set the console speed.
the ZyWALL.
authentication.
Login Page Configure how the login and access user screens
look.
by the Vantage CNM server.
Configure where and how to send daily reports and what reports to send.
syslog servers.
3.3.2.4 Maintenance Menu
Use the maintenance menu screens to manage configuration and firmware files, run diagnostics, and reboot or shut down the ZyWALL.
Table 8 Maintenance Menu Screens Summary
FOLDER OR LINK
File Manager Configuration
ZyWALL USG 20/20W User’s Guide
TAB FUNCTION
File
Firmware Package
Shell Script Manage and run shell script files for the ZyWALL.
Manage and upload configuration files for the ZyWALL.
View the current firmware version and to upload firmware.
51
Chapter 3 Web Configurator
Table 8 Maintenance Menu Screens Summary (continued)
FOLDER OR LINK
Diagnostics Diagnostic Collect diagnostic information.
Packet Flow Explore
Reboot Restart the ZyWALL.
Shutdown Turn off the ZyWALL.
3.3.3 Main Window
The main window shows the screen you select in the navigation panel. The main window screens are discussed in the rest of this document.
TAB FUNCTION
Packet Capture Capture packets for analysis.
Routing Status View a clear picture on how the ZyWALL
determines where to route a packet and check the related settings.
SNAT Status View a clear picture on how the ZyWALL converts a
packet’s source IP address and check the related settings.
Right after you log in, the Dashboard screen is displayed. See Chapter 8 on page
165 for more information about the Dashboard screen.
3.3.3.1 Warning Messages
Warning messages, such as those resulting from misconfiguration, display in a popup window.
Figure 12 Warning Message
52
ZyWALL USG 20/20W User’s Guide
3.3.3.2 Site Map
Click Site MAP to see an overview of links to the Web Configurator screens. Click a screen’s link to go to that screen.
Figure 13 Site Map
Chapter 3 Web Configurator
3.3.3.3 Object Reference
Click Object Ref erence to open the Object Reference screen. Select the type of object and the individual object and click Refresh to show which configuration settings reference the object. The following example shows which configuration settings reference the ldap-users user object (in this case the first firewall rule).
Figure 14 Object Reference
ZyWALL USG 20/20W User’s Guide
53
Chapter 3 Web Configurator
The fields vary with the type of object. The following table describes labels that can appear in this screen.
Table 9 Object References
LABEL DESCRIPTION
Object Name This identifies the object for which the configuration settings that use it
# This field is a sequential value, and it is not associated with any entry.
Service This is the type of setting that references the selected object. Click a
Priority If it is applicable, this field lists the referencing configuration item’s
Name This field identifies the configuration item that references the object.
Description If the referencing configuration item has a description configured, it
Refresh Click this to update the information in this screen. Cancel Click Cancel to close the screen.
are displayed. Click the object’s name to display the object’s configuration screen in the main window.
service’s name to display the service’s configuration screen in the main window.
position in its list, otherwise N/A displays.
displays here.
3.3.3.4 CLI Messages
Click CLI to look at the CLI commands sent by the Web Configurator. These commands appear in a popup window, such as the following.
Figure 15 CLI Messages
Click Clear to remove the currently displayed information.
See the Command Reference Guide for information about the commands.
3.3.4 Tables and Lists
The Web Configurator tables and lists are quite flexible and provide several options for how to display their entries.
54
ZyWALL USG 20/20W User’s Guide
3.3.4.1 Manipulating Table Display
Here are some of the ways you can manipulate the Web Configurator tables.
1 Click a column heading to sort the table’s entries according to that column’s
criteria.
Figure 16 Sorting Table Entries by a Column’s Criteria
2 Click the down arrow next to a column heading for more options about how to
display the entries. The options available vary depending on the type of fields in the column. Here are some examples of what you can do:
Chapter 3 Web Configurator
• Sort in ascending alphabetical order
• Sort in descending (reverse) alphabetical order
• Select which columns to display
• Group entries by field
• Show entries in groups
• Filter by mathematical operators (<, >, or =) or searching for text
Figure 17 Common Table Column Options
ZyWALL USG 20/20W User’s Guide
55
Chapter 3 Web Configurator
3 Select a column heading cell’s right border and drag to re-size the column.
Figure 18 Resizing a Table Column
4 Select a column heading and drag and drop it to change the column order. A green
check mark displays next to the column’s title when you drag the column to a valid new location.
Figure 19 Changing the Column Order
5 Use the icons and fields at the bottom of the table to navigate to different pages of
entries and control how many entries display at a time.
Figure 20 Navigating Pages of Table Entries
56
ZyWALL USG 20/20W User’s Guide
3.3.4.2 Working with Table Entries
The tables have icons for working with table entries. A sample is shown next. You can often use the [Shift] or [Ctrl] key to select multiple entries to remove, activate, or deactivate.
Figure 21 Common Table Icons
Here are descriptions for the most common table icons.
Table 10 Common Table Icons
LABEL DESCRIPTION
Add Click this to create a new entry. For features where the entry’s
position in the numbered list is important (features where the ZyWALL applies the table’s entries in order like the firewall for example), you can select an entry and click Add to create a new entry after the selected entry.
Edit Double-click an entry or select it and click Edit to open a screen
where you can modify the entry’s settings. In some tables you can just click a table entry and edit it directly in the table. For those types of tables small red triangles display for table entries with changes that you have not yet applied.
Remove To remove an entry, select it and click Remove. The ZyWALL
confirms you want to remove it before doing so.
Activate To turn on an entry, select it and click Activate. Inactivate To turn off an entry, select it and click Inactivate. Connect To connect an entry, select it and click Connect. Disconnect To disconnect an entry, select it and click Disconnect. Object References Select an entry and click Object References to open a screen that
shows which settings use the entry. See Section 11.3.2 on page 232 for an example.
Move To change an entry’s position in a numbered list, select it and click
Move to display a field to type a number for where you want to put that entry and press [ENTER] to move the entry to the number that you typed. For example, if you type 6, the entry you are moving becomes number 6 and the previous entry 6 (if there is one) gets pushed up (or down) one.
Chapter 3 Web Configurator
3.3.4.3 Working with Lists
When a list of available entries displays next to a list of selected entries, you can often just double-click an entry to move it from one list to the other. In some lists
ZyWALL USG 20/20W User’s Guide
57
Chapter 3 Web Configurator
you can also use the [Shift] or [Ctrl] key to select multiple entries, and then use the arrow button to move them to the other list.
Figure 22 Working with Lists
58
ZyWALL USG 20/20W User’s Guide
CHAPTER 4

Installation Setup Wizard

4.1 Installation Setup Wizard Screens

If you log into the Web Configurator when the ZyWALL is using its default configuration, the first Installation Setup Wizard screen displays. This wizard helps you configure Internet connection settings and activate subscription services. This chapter provides information on configuring the Web Configurator's installation setup wizard. See the feature-specific chapters in this User’s Guide for background information.
Figure 23 Installation Setup Wizard
• Click the double arrow in the upper right corner to display or hide the help.
•Click Go to Dashboard to skip the installation setup wizard or click Next to start configuring for Internet access.
4.1.1 Internet Access Setup - WAN Interface
Use this screen to configure the WAN interface’s type of encapsulation and method of IP address assignment.
ZyWALL USG 20/20W User’s Guide
59
Chapter 4 Installation Setup Wizard
The screens vary depending on the encapsulation type. Refer to information provided by your ISP to know what to enter in each field. Leave a field blank if you don’t have that information.
Note: Enter the Internet access information exactly as your ISP gave it to you. Figure 24 Internet Access: Step 1
Encapsulation: Choose the Ethernet option when the WAN port is used as a regular Ethernet. Otherwise, choose PPPoE or PPTP for a dial-up connection according to the information from your ISP.
WAN Interface: This is the interface you are configuring for Internet access.
Zone: This is the security zone to which this interface and Internet connection belong.
IP Address Assignment: Select Auto if your ISP did not assign you a fixed IP address. Select Static if the ISP assigned a fixed IP address.
4.1.2 Internet Access: Ethernet
This screen is read-only if you set the previous screen’s IP Address Assignment field to Auto. Use this screen to configure your IP address settings.
Note: Enter the Internet access information exactly as given to you by your ISP. Figure 25 Internet Access: Ethernet Encapsulation
Encapsulation: This displays the type of Internet connection you are configuring.
First WAN Interface: This is the number of the interface that will connect with your ISP.
Zone: This is the security zone to which this interface and Internet connection will belong.
60
ZyWALL USG 20/20W User’s Guide
IP Address: Enter your (static) public IP address. Auto displays if you selected Auto as the IP Address Assignment in the previous screen.
The following fields display if you selected static IP address assignment.
IP Subnet Mask: Enter the subnet mask for this WAN connection's IP address.
Gateway IP Address: Enter the IP address of the router through which this WAN connection will send traffic (the default gateway).
First / Second DNS Server: These fields display if you selected static IP address assignment. The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a DNS server's IP address(es). The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyWALL uses these (in the order you specify here) to resolve domain names for VPN, DDNS and the time server. Leave the field as 0.0.0.0 if you do not want to configure DNS servers.
4.1.3 Internet Access: PPPoE
Note: Enter the Internet access information exactly as given to you by your ISP.
Chapter 4 Installation Setup Wizard
Figure 26 Internet Access: PPPoE Encapsulation
4.1.3.1 ISP Parameters
• Type the PPPoE Service Name from your service provider. PPPoE uses a service name to identify and reach the PPPoE server. You can use alphanumeric and ­_@$./ characters, and it can be up to 64 characters long.
Authentication Type - Select an authentication protocol for outgoing connection requests. Options are:
ZyWALL USG 20/20W User’s Guide
61
Chapter 4 Installation Setup Wizard
CHAP/PAP - Your ZyWALL accepts either CHAP or PAP when requested by
the remote node.
CHAP - Your ZyWALL accepts CHAP only.
PAP - Your ZyWALL accepts PAP only.
MSCHAP - Your ZyWALL accepts MSCHAP only.
MSCHAP-V2 - Your ZyWALL accepts MSCHAP-V2 only.
• Type the User Name given to you by your ISP. You can use alphanumeric and ­_@$./ characters, and it can be up to 31 characters long.
• Type the Password associated with the user name. Use up to 64 ASCII characters except the [] and ?. This field can be blank.
• Select Nailed-Up if you do not want the connection to time out. Otherwise, type the Idle Timeout in seconds that elapses before the router automatically disconnects from the PPPoE server.
4.1.3.2 WAN IP Address Assignments
WAN Interface: This is the name of the interface that will connect with your ISP.
Zone: This is the security zone to which this interface and Internet connection will belong.
IP Address: Enter your (static) public IP address. Auto displays if you selected Auto as the IP Address Assignment in the previous screen.
First / Second DNS Server: These fields display if you selected static IP address assignment. The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a DNS server's IP address(es). The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyWALL uses these (in the order you specify here) to resolve domain names for VPN, DDNS and the time server. Leave the field as 0.0.0.0 if you do not want to configure DNS servers. If you do not configure a DNS server, you must know the IP address of a machine in order to access it.
62
ZyWALL USG 20/20W User’s Guide
4.1.4 Internet Access: PPTP
Note: Enter the Internet access information exactly as given to you by your ISP. Figure 27 Internet Access: PPTP Encapsulation
Chapter 4 Installation Setup Wizard
4.1.5 ISP Parameters
Authentication Type - Select an authentication protocol for outgoing calls. Options are:
CHAP/PAP - Your ZyWALL accepts either CHAP or PAP when requested by
the remote node.
CHAP - Your ZyWALL accepts CHAP only.
PAP - Your ZyWALL accepts PAP only.
MSCHAP - Your ZyWALL accepts MSCHAP only.
MSCHAP-V2 - Your ZyWALL accepts MSCHAP-V2 only.
• Type the User Name given to you by your ISP. You can use alphanumeric and ­_@$./ characters, and it can be up to 31 characters long.
• Type the Password associated with the user name. Use up to 64 ASCII characters except the [] and ?. This field can be blank. Re-type your password in the next field to confirm it.
ZyWALL USG 20/20W User’s Guide
63
Chapter 4 Installation Setup Wizard
• Select Nailed-Up if you do not want the connection to time out. Otherwise, type the Idle Timeout in seconds that elapses before the router automatically disconnects from the PPTP server.
4.1.5.1 PPTP Configuration
Base Interface: This identifies the Ethernet interface you configure to connect with a modem or router.
•Type a Base IP Address (static) assigned to you by your ISP.
• Type the IP Subnet Mask assigned to you by your ISP (if given).
Server IP: Type the IP address of the PPTP server.
•Type a Connection ID or connection name. It must follow the “c:id” and “n:name” format. For example, C:12 or N:My ISP. This field is optional and depends on the requirements of your broadband modem or router. You can use alphanumeric and -_: characters, and it can be up to 31 characters long.
4.1.5.2 WAN IP Address Assignments
First WAN Interface: This is the connection type on the interface you are configuring to connect with your ISP.
Zone This is the security zone to which this interface and Internet connection will belong.
IP Address: Enter your (static) public IP address. Auto displays if you selected Auto as the IP Address Assignment in the previous screen.
First / Second DNS Server: These fields display if you selected static IP address assignment. The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a DNS server's IP address(es). The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyWALL uses these (in the order you specify here) to resolve domain names for VPN, DDNS and the time server. Leave the field as 0.0.0.0 if you do not want to configure DNS servers.
64
ZyWALL USG 20/20W User’s Guide
4.1.6 Internet Access - Finish
You have set up your ZyWALL to access the Internet. After configuring the WAN interface, a screen displays with your settings. If they are not correct, click Back.
Figure 28 Internet Access: Ethernet Encapsulation
Chapter 4 Installation Setup Wizard
Note: If you have not already done so, you can register your ZyWALL with
myZyXEL.com and activate trials of services like Content Filter.
Click Next and use the following screen to perform a basic registration (see
Section 4.2 on page 65). If you want to do a more detailed registration or manage
your account details, click myZyXEL.com.
Alternatively, close the window to exit the wizard.

4.2 Device Registration

Use this screen to register your ZyWALL with myZXEL.com and activate trial periods of subscription security features if you have not already done so. If the ZyWALL is already registered this screen displays your user name and which trial services are activated (if any). You can still activate any un-activated trial services.
Note: You must be connected to the Internet to register.
ZyWALL USG 20/20W User’s Guide
65
Chapter 4 Installation Setup Wizard
Use the Registration > Service screen to update your service subscription status.
Figure 29 Registration
• Select new myZyXEL.com account if you haven’t created an account at myZyXEL.com, select this option and configure the following fields to create an account and register your ZyWALL.
• Select existing myZyXEL.com account if you already have an account at myZyXEL.com and enter your user name and password in the fields below to register your ZyWALL.
•Enter a User Name for your myZyXEL.com account. Use from six to 20 alphanumeric characters (and the underscore). Spaces are not allowed. Click Check to verify that it is available.
Password: Use six to 20 alphanumeric characters (and the underscore). Spaces are not allowed. Type it again in the Confirm Password field.
E-Mail Address: Enter your e-mail address. Use up to 80 alphanumeric characters (periods and the underscore are also allowed) without spaces.
Country Code: Select your country from the drop-down box list.
66
ZyWALL USG 20/20W User’s Guide
Chapter 4 Installation Setup Wizard
Trial Service Activation: You can try a trial service subscription. The trial period starts the day you activate the trial. After the trial expires, you can buy an iCard and enter the license key in the Registration > Service screen to extend the service.
Figure 30 Registraton: Registered Device
ZyWALL USG 20/20W User’s Guide
67
Chapter 4 Installation Setup Wizard
68
ZyWALL USG 20/20W User’s Guide
CHAPTER 5

Quick Setup

5.1 Quick Setup Overview

The Web Configurator's quick setup wizards help you configure Internet and VPN connection settings. This chapter provides information on configuring the quick setup screens in the Web Configurator. See the feature-specific chapters in this User’s Guide for background information.
In the Web Configurator, click Configuration > Quick Setup to open the first Quick Setup screen.
Figure 31 Quick Setup
• WAN Interface
Click this link to open a wizard to set up a WAN (Internet) connection. This wizard creates matching ISP account settings in the ZyWALL if you use PPPoE or PPTP. See Section 5.2 on page 70.
•VPN SETUP
Use VPN SETUP to configure a VPN (Virtual Private Network) tunnel for a secure connection to another computer or network. See Section 5.4 on page 76.
ZyWALL USG 20/20W User’s Guide
69
Chapter 5 Quick Setup

5.2 WAN Interface Quick Setup

Click WAN Interface in the main Quick Setup screen to open the WAN Interface Quick Setup Wizard Welcome screen. Use these screens to configure an interface to connect to the internet. Click Next.
Figure 32 WAN Interface Quick Setup Wizard
5.2.1 Choose an Ethernet Interface
Select the Ethernet interface that you want to configure for a WAN connection and click Next.
Figure 33 Choose an Ethernet Interface
5.2.2 Select WAN Type
70
WAN Type Selection: Select the type of encapsulation this connection is to use. Choose Ethernet when the WAN port is used as a regular Ethernet.
ZyWALL USG 20/20W User’s Guide
Chapter 5 Quick Setup
Otherwise, choose PPPoE or PPTP for a dial-up connection according to the information from your ISP.
Figure 34 WAN Interface Setup: Step 2
The screens vary depending on what encapsulation type you use. Refer to information provided by your ISP to know what to enter in each field. Leave a field blank if you don’t have that information.
Note: Enter the Internet access information exactly as your ISP gave it to you.
5.2.3 Configure WAN Settings
Use this screen to select whether the interface should use a fixed or dynamic IP address.
Figure 35 WAN Interface Setup: Step 2
WAN Interface: This is the interface you are configuring for Internet access.
Zone: This is the security zone to which this interface and Internet connection belong.
ZyWALL USG 20/20W User’s Guide
71
Chapter 5 Quick Setup
IP Address Assignment: Select Auto If your ISP did not assign you a fixed IP address. Select Static If the ISP assigned a fixed IP address.
5.2.4 WAN and ISP Connection Settings
Use this screen to configure the ISP and WAN interface settings. This screen is read-only if you set the IP Address Assignment to Static.
Note: Enter the Internet access information exactly as your ISP gave it to you.
Figure 36 WAN and ISP Connection Settings: (PPTP Shown)
72
The following table describes the labels in this screen.
Table 11 WAN and ISP Connection Settings
LABEL DESCRIPTION
ISP Parameter This section appears if the interface uses a PPPoE or PPTP Internet
connection.
Encapsulation This displays the type of Internet connection you are configuring.
ZyWALL USG 20/20W User’s Guide
Chapter 5 Quick Setup
Table 11 WAN and ISP Connection Settings (continued)
LABEL DESCRIPTION
Authentication Type
User Name Type the user name given to you by your ISP. You can use
Password Type the password associated with the user name above. Use up to 64
Retype to Confirm
Nailed-Up Select Nailed-Up if you do not want the connection to time out.
Idle Timeout Type the time in seconds that elapses before the router automatically
PPTP Configuration
Base Interface This displays the identity of the Ethernet interface you configure to
Base IP Address
IP Subnet Mask
Server IP Type the IP address of the PPTP server.
Connection ID Enter the connection ID or connection name in this field. It must
Use the drop-down list box to select an authentication protocol for outgoing calls. Options are:
CHAP/PAP - Your ZyWALL accepts either CHAP or PAP when requested by this remote node.
CHAP - Your ZyWALL accepts CHAP only. PAP - Your ZyWALL accepts PAP only. MSCHAP - Your ZyWALL accepts MSCHAP only. MSCHAP-V2 - Your ZyWALL accepts MSCHAP-V2 only.
alphanumeric and -_ characters long.
ASCII characters except the [] and ?. This field can be blank.
Type your password again for confirmation.
disconnects from the PPPoE server. 0 means no timeout.
This section only appears if the interface uses a PPPoE or PPTP Internet connection.
connect with a modem or router.
Type the (static) IP address assigned to you by your ISP.
Type the subnet mask assigned to you by your ISP (if given).
follow the "c:id" and "n:name" format. For example, C:12 or N:My ISP. This field is optional and depends on the requirements of your DSL modem.
@$./ characters, and it can be up to 31
You can use alphanumeric and -_ characters long.
WAN Interface Setup
WAN Interface This displays the identity of the interface you configure to connect
with your ISP.
Zone This field displays to which security zone this interface and Internet
connection will belong.
IP Address This field is read-only when the WAN interface uses a dynamic IP
address. If your WAN interface uses a static IP address, enter it in this field.
ZyWALL USG 20/20W User’s Guide
: characters, and it can be up to 31
73
Chapter 5 Quick Setup
Table 11 WAN and ISP Connection Settings (continued)
LABEL DESCRIPTION
First DNS Server
Second DNS Server
Back Click Back to return to the previous screen. Next Click Next to continue.
These fields only display for an interface with a static IP address. Enter the DNS server IP address(es) in the field(s) to the right.
Leave the field as 0.0.0.0 if you do not want to configure DNS servers. If you do not configure a DNS server, you must know the IP address of a machine in order to access it.
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyWALL uses a system DNS server (in the order you specify here) to resolve domain names for VPN, DDNS and the time server.
5.2.5 Quick Setup Interface Wizard: Summary
This screen displays the WAN interface’s settings.
Figure 37 Interface Wizard: Summary WAN (PPTP Shown)
The following table describes the labels in this screen.
Table 12 Interface Wizard: Summary WAN
LABEL DESCRIPTION
Encapsulation This displays what encapsulation this interface uses to connect to the
Internet.
Service Name This field is read-only and only appears for a PPPoE interface. It displays
the PPPoE service name specified in the ISP account.
Server IP This field only appears for a PPTP interface. It displays the IP address of
the PPTP server.
74
ZyWALL USG 20/20W User’s Guide
Chapter 5 Quick Setup
Table 12 Interface Wizard: Summary WAN
LABEL DESCRIPTION
User Name This is the user name given to you by your ISP. Nailed-Up If No displays the connection will not time out. Yes means the ZyWALL
uses the idle timeout.
Idle Timeout This is how many seconds the connection can be idle before the router
automatically disconnects from the PPPoE server. 0 means no timeout.
Connection ID If you specified a connection ID, it displays here.
WAN Interface This identifies the interface you configure to connect with your ISP.
Zone This field displays to which security zone this interface and Internet
connection will belong.
IP Address Assignment
First DNS Server
Second DNS Server
Close Click Close to exit the wizard.
This field displays whether the WAN IP address is static or dynamic (Auto).
If the IP Address Assignment is Static, these fields display the DNS server IP address(es).

5.3 VPN Quick Setup

Click VPN Setup in the main Quick Setup screen to open the VPN Setup Wizard Welcome screen. The VPN wizard creates corresponding VPN connection
and VPN gateway settings and address objects that you can use later in configuring more VPN connections or other features. Click Next.
Figure 38 VPN Quick Setup Wizard
ZyWALL USG 20/20W User’s Guide
75
Chapter 5 Quick Setup

5.4 VPN Setup Wizard: Wizard Type

A VPN (Virtual Private Network) tunnel is a secure connection to another computer or network. Use this screen to select which type of VPN connection you want to configure.
Figure 39 VPN Setup Wizard: Wizard Type
Express: Use this wizard to create a VPN connection with another ZLD-based ZyWALL using a pre-shared key and default security settings.
Advanced: Use this wizard to configure detailed VPN security settings such as using certificates. The VPN connection can be to another ZLD-based ZyWALL or other IPSec device.
76
ZyWALL USG 20/20W User’s Guide

5.5 VPN Express Wizard - Scenario

Click the Express radio button as shown in Figure 39 on page 76 to display the following screen.
Figure 40 VPN Express Wizard: Step 2
Chapter 5 Quick Setup
Rule Name: Type the name used to identify this VPN connection (and VPN gateway). You may use 1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Select the scenario that best describes your intended VPN connection. The figure on the left of the screen changes to match the scenario you select.
• Site-to-site - Choose this if the remote IPSec device has a static IP address or a domain name. This ZyWALL can initiate the VPN tunnel.
• Site-to-site with Dynamic Peer - Choose this if the remote IPSec device has a dynamic IP address. Only the remote IPSec device can initiate the VPN tunnel.
• Remote Access (Server Role) - Choose this to allow incoming connections from IPSec VPN clients. The clients have dynamic IP addresses and are also known as dial-in users. Only the clients can initiate the VPN tunnel.
• Remote Access (Client Role) - Choose this to connect to an IPSec server. This ZyWALL is the client (dial-in user) and can initiate the VPN tunnel.
ZyWALL USG 20/20W User’s Guide
77
Chapter 5 Quick Setup
5.5.1 VPN Express Wizard - Configuration
Figure 41 VPN Express Wizard: Step 3
Secure Gateway: If Any displays in this field, it is not configurable for the chosen scenario. If this field is configurable, enter the WAN IP address or domain name of the remote IPSec device (secure gateway) to identify the remote IPSec router by its IP address or a domain name. Use 0.0.0.0 if the remote IPSec router has a dynamic WAN IP address.
Pre-Shared Key: Type the password. Both ends of the VPN tunnel must use the same password. Use 8 to 31 case-sensitive ASCII characters or 8 to 31 pairs of hexadecimal (“0-9”, “A-F”) characters. Proceed a hexadecimal key with “0x”. You will receive a PYLD_MALFORMED (payload malformed) packet if the same pre-shared key is not used on both ends.
Local Policy (IP/Mask): Type the IP address of a computer on your network. You can also specify a subnet. This must match the remote IP address configured on the remote IPSec device.
Remote Policy (IP/Mask): If Any displays in this field, it is not configurable for the chosen scenario. If this field is configurable, type the IP address of a computer behind the remote IPSec device. You can also specify a subnet. This must match the local IP address configured on the remote IPSec device.
78
ZyWALL USG 20/20W User’s Guide
5.5.2 VPN Express Wizard - Summary
This screen provides a read-only summary of the VPN tunnel’s configuration and also commands that you can copy and paste into another ZLD-based ZyWALL’s command line interface to configure it.
Figure 42 VPN Express Wizard: Step 4
Chapter 5 Quick Setup
Rule Name: Identifies the VPN gateway policy.
Secure Gateway: IP address or domain name of the remote IPSec device. If this field displays Any, only the remote IPSec device can initiate the VPN connection.
Pre-Shared Key: VPN tunnel password. It identifies a communicating party during a phase 1 IKE negotiation.
Local Policy: (Static) IP address and subnet mask of the computers on the network behind your ZyWALL that can use the tunnel.
Remote Policy: (Static) IP address and subnet mask of the computers on the network behind the remote IPSec device that can use the tunnel. If this field displays Any, only the remote IPSec device can initiate the VPN connection.
• Copy and paste the Configuration for Secure Gateway commands into another ZLD-based ZyWALL’s command line interface to configure it to serve as the other end of this VPN tunnel. You can also use a text editor to save these commands as a shell script file with a “.zysh” filename extension. Then you can use the file manager to run the script in order to configure the VPN connection. See the commands reference guide for details on the commands displayed in this list.
ZyWALL USG 20/20W User’s Guide
79
Chapter 5 Quick Setup
5.5.3 VPN Express Wizard - Finish
Now you can use the VPN tunnel.
Figure 43 VPN Express Wizard: Step 6
80
Note: If you have not already done so, use the myZyXEL.com link and register your
ZyWALL with myZyXEL.com and activate trials of services like Content Filter.
Click Close to exit the wizard.
ZyWALL USG 20/20W User’s Guide
5.5.4 VPN Advanced Wizard - Scenario
Click the Advanced radio button as shown in Figure 39 on page 76 to display the following screen.
Figure 44 VPN Advanced Wizard: Scenario
Chapter 5 Quick Setup
Rule Name: Type the name used to identify this VPN connection (and VPN gateway). You may use 1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Select the scenario that best describes your intended VPN connection. The figure on the left of the screen changes to match the scenario you select.
• Site-to-site - Choose this if the remote IPSec device has a static IP address or a domain name. This ZyWALL can initiate the VPN tunnel.
• Site-to-site with Dynamic Peer - Choose this if the remote IPSec device has a dynamic IP address. Only the remote IPSec device can initiate the VPN tunnel.
• Remote Access (Server Role) - Choose this to allow incoming connections from IPSec VPN clients. The clients have dynamic IP addresses and are also known as dial-in users. Only the clients can initiate the VPN tunnel.
ZyWALL USG 20/20W User’s Guide
81
Chapter 5 Quick Setup
• Remote Access (Client Role) - Choose this to connect to an IPSec server. This ZyWALL is the client (dial-in user) and can initiate the VPN tunnel.
5.5.5 VPN Advanced Wizard - Phase 1 Settings
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA (Security Association).
Figure 45 VPN Advanced Wizard: Phase 1 Settings
Secure Gateway: If Any displays in this field, it is not configurable for the chosen scenario. If this field is configurable, enter the WAN IP address or domain name of the remote IPSec device (secure gateway) to identify the remote IPSec device by its IP address or a domain name. Use 0.0.0.0 if the remote IPSec device has a dynamic WAN IP address.
My Address (interface): Select an interface from the drop-down list box to use on your ZyWALL.
Negotiation Mode: Select Main for identity protection. Select Aggressive to allow more incoming connections from dynamic IP addresses to use separate passwords.
Note: Multiple SAs connecting through a secure gateway must have the same
negotiation mode.
Encryption Algorithm: 3DES and AES use encryption. The longer the key, the higher the security (this may affect throughput). Both sender and receiver must know the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES
82
ZyWALL USG 20/20W User’s Guide
Chapter 5 Quick Setup
that uses a 168-bit key. As a result, 3DES is more secure than DES. It also requires more processing power, resulting in increased latency and decreased throughput. AES128 uses a 128-bit key and is faster than 3DES. AES192 uses a 192-bit key and AES256 uses a 256-bit key.
Authentication Algorithm: MD5 gives minimal security. SHA-1 gives higher security. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower.
Key Group: DH5 is more secure than DH1 or DH2 (although it may affect throughput). DH1 (default) refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a 1536 bit random number.
SA Life Time: Set how often the ZyWALL renegotiates the IKE SA. A short SA life time increases security, but renegotiation temporarily disconnects the VPN tunnel.
NAT Traversal: Select this if the VPN tunnel must pass through NAT (there is a NAT router between the IPSec devices).
Note: The remote IPSec device must also have NAT traversal enabled. See VPN,
NAT, and NAT Traversal on page 419 for more information.
Dead Peer Detection (DPD) has the ZyWALL make sure the remote IPSec device is there before transmitting data through the IKE SA. If there has been no traffic for at least 15 seconds, the ZyWALL sends a message to the remote IPSec device. If it responds, the ZyWALL transmits the data. If it does not respond, the ZyWALL shuts down the IKE SA.
Authentication Method: Select Pre-Shared Key to use a password or Certificate to use one of the ZyWALL’s certificates.
5.5.6 VPN Advanced Wizard - Phase 2
Phase 2 in an IKE uses the SA that was established in phase 1 to negotiate SAs for IPSec.
Figure 46 VPN Advanced Wizard: Step 4
ZyWALL USG 20/20W User’s Guide
83
Chapter 5 Quick Setup
Active Protocol: ESP is compatible with NAT, AH is not.
Encapsulation: Tunnel is compatible with NAT, Transport is not.
Encryption Algorithm: 3DES and AES use encryption. The longer the AES key, the higher the security (this may affect throughput). Null uses no encryption.
Authentication Algorithm: MD5 gives minimal security. SHA-1 gives higher security. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower.
SA Life Time: Set how often the ZyWALL renegotiates the IKE SA. A short SA life time increases security, but renegotiation temporarily disconnects the VPN tunnel.
• Perfect Forward Secrecy (PFS): Disabling PFS allows faster IPSec setup, but is less secure. Select DH1, DH2 or DH5 to enable PFS. DH5 is more secure than DH1 or DH2 (although it may affect throughput). DH1 refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a 1536 bit random number (more secure, yet slower).
Local Policy (IP/Mask): Type the IP address of a computer on your network. You can also specify a subnet. This must match the remote IP address configured on the remote IPSec device.
Remote Policy (IP/Mask): Type the IP address of a computer behind the remote IPSec device. You can also specify a subnet. This must match the local IP address configured on the remote IPSec device.
Nailed-Up: This displays for the site-to-site and remote access client role scenarios. Select this to have the ZyWALL automatically renegotiate the IPSec SA when the SA life time expires.
84
ZyWALL USG 20/20W User’s Guide
5.5.7 VPN Advanced Wizard - Summary
This is a read-only summary of the VPN tunnel settings.
Figure 47 VPN Advanced Wizard: Step 5
Chapter 5 Quick Setup
Rule Name: Identifies the VPN connection (and the VPN gateway).
Secure Gateway: IP address or domain name of the remote IPSec device.
Pre-Shared Key: VPN tunnel password.
Certificate: The certificate the ZyWALL uses to identify itself when setting up the VPN tunnel.
Local Policy: IP address and subnet mask of the computers on the network behind your ZyWALL that can use the tunnel.
Remote Policy: IP address and subnet mask of the computers on the network behind the remote IPSec device that can use the tunnel.
• Copy and paste the Configuration for Remote Gateway commands into another ZLD-based ZyWALL’s command line interface.
•Click Save to save the VPN rule.
ZyWALL USG 20/20W User’s Guide
85
Chapter 5 Quick Setup
5.5.8 VPN Advanced Wizard - Finish
Now you can use the VPN tunnel.
Figure 48 VPN Wizard: Step 6: Advanced
86
Note: If you have not already done so, you can register your ZyWALL with
myZyXEL.com and activate trials of services like Content Filter.
Click Close to exit the wizard.
ZyWALL USG 20/20W User’s Guide
CHAPTER 6

Configuration Basics

This information is provided to help you configure the ZyWALL effectively. Some of it is helpful when you are just getting started. Some of it is provided for your reference when you configure various features in the ZyWALL.
Section 6.1 on page 87 introduces the ZyWALL’s object-based configuration.
Section 6.2 on page 88 introduces zones, interfaces, and port groups.
Section 6.3 on page 91 introduces some terminology and organization for the ZyWALL.
Section 6.4 on page 91 covers the ZyWALL’s packet flow.
Section 6.5 on page 95 identifies the features you should configure before and after you configure the main screens for each feature. For example, if you want to configure a trunk for load-balancing, you should configure the member interfaces before you configure the trunk. After you configure the trunk, you should configure a policy route for it as well. (You might also have to configure criteria for the policy route.)
Section 6.6 on page 103 identifies the objects that store information used by other features.
Section 6.7 on page 105 introduces some of the tools available for system management.

6.1 Object-based Configuration

The ZyWALL stores information or settings as objects. You use these objects to configure many of the ZyWALL’s features and settings. Once you configure an object, you can reuse it in configuring other features.
When you change an object’s settings, the ZyWALL automatically updates all the settings or rules that use the object. For example, if you create a schedule object, you can have firewall, content filter, and other settings use it. If you modify the schedule, all the firewall, content filter, and other settings that use the schedule automatically apply the updated schedule.
You can create address objects based on an interface’s IP address, subnet, or gateway. The ZyWALL automatically updates every rule or setting that uses these objects whenever the interface’s IP address settings change. For example, if you
ZyWALL USG 20/20W User’s Guide
87
Chapter 6 Configuration Basics
Physical Ports
Interfaces
Zones
LAN1
DMZ
lan1
dmz
LAN2
lan2
WAN
wan1
change an Ethernet interface’s IP address, the ZyWALL automatically updates the rules or settings that use the interface-based, LAN subnet address object.
You can use the Configuration > Objects screens to create objects before you configure features that use them. If you are in a screen that uses objects, you can also usually select Create new Object to be able to configure a new object. For a list of common objects, see Section 6.6 on page 103.
Use the Object Reference screen (Section 3.3.3.3 on page 53) to see what objects are configured and which configuration settings reference specific objects.

6.2 Zones, Interfaces, and Physical Ports

Zones (groups of interfaces and VPN tunnels) simplify security settings. Here is an overview of zones, interfaces, and physical ports in the ZyWALL.
Figure 49
88
Table 13 Zones, Interfaces, and Physical Ethernet Ports
Zones
(WAN,LAN, DMZ)
Interfaces
(Ethernet, VLAN,...)
Physical Ethernet Ports
(P1, P2, ...)
A zone is a group of interfaces and VPN tunnels. Use zones to apply security settings such as firewall, remote management.
Interfaces are logical entities that (layer-3) packets pass through. Use interfaces in configuring VPN, zones, trunks, DDNS, policy routes, static routes, HTTP redirect, and NAT.
Port roles combine physical ports into interfaces.
The physical port is where you connect a cable. In configuration, you use physical ports when configuring port groups. You use interfaces and zones in configuring other features.
ZyWALL USG 20/20W User’s Guide
6.2.1 Interface Types
There are many types of interfaces in the ZyWALL. In addition to being used in various features, interfaces also describe the network that is directly connected to the ZyWALL.
Ethernet interfaces are the foundation for defining other interfaces and network policies. You also configure RIP and OSPF in these interfaces.
Port groups create a hardware connection between physical ports at the layer­2 (data link, MAC address) level. Port groups are created when you use the Interface > Port Roles screen to set multiple physical ports to be part of the same (lan1, lan2 or dmz) interface.
PPP interfaces support Point-to-Point Protocols (PPPoE or PPTP). ISP accounts are required for PPPoE/PPTP interfaces.
VLAN interfaces recognize tagged frames. The ZyWALL automatically adds or removes the tags as needed. Each VLAN can only be associated with one Ethernet interface.
Bridge interfaces create a software connection between Ethernet or VLAN interfaces at the layer-2 (data link, MAC address) level. Then, you can configure the IP address and subnet mask of the bridge. It is also possible to configure zone-level security between the member interfaces in the bridge.
Chapter 6 Configuration Basics
Virtual interfaces increase the amount of routing information in the ZyWALL. There are three types: virtual Ethernet interfaces (also known as IP alias), virtual VLAN interfaces, and virtual bridge interfaces.
ZyWALL USG 20/20W User’s Guide
89
Chapter 6 Configuration Basics
6.2.2 Default Interface and Zone Configuration
This section introduces the ZyWALL’s default zone member physical interfaces and the default configuration of those interfaces. The following figure uses letters to denote public IP addresses or part of a private IP address.
Figure 50 Default Network Topology
Table 14 ZyWALL USG 20 Default Port, Interface, and Zone Configuration
PORT INTERFACE ZONE
P1 wan1 WAN DHCP clients Connections to the Internet
P2, P3 lan1 LAN1 192.168.1.1, DHCP
P4 lan2 LAN2 192.168.2.1, DHCP
P5 dmz DMZ 192.168.3.1, DHCP
CONSOLE n/a None None Local management
• The WAN zone contains the wan1 interface (physical port P1). It uses a public IP address to connect to the Internet.
• The LAN1 zone contains the lan1 interface (a port group made up of physical ports P2 and P3 on the ZyWALL). The LAN1 zone is a protected zone. The lan1 interface uses 192.168.1.1 and the connected devices use IP addresses in the
192.168.1.2 to 192.168.1.254 range.
IP ADDRESS AND DHCP SETTINGS
server enabled
server enabled
server disabled
SUGGESTED USE WITH DEFAULT SETTINGS
Protected LAN
Protected LAN
Public servers (such as web, e-mail and FTP)
90
ZyWALL USG 20/20W User’s Guide
• The DMZ zone contains the dmz interface (physical port P6). The DMZ zone has servers that are available to the public. The dmz interface uses private IP address 192.168.3.1 and the connected devices use private IP addresses in the
192.168.3.2 to 192.168.3.254 range.

6.3 Terminology in the ZyWALL

This section highlights some terminology or organization for ZLD-based ZyWALLs.
Table 15 ZLD ZyWALL Terminology
FEATURE / TERM ZLD ZYWALL FEAT URE / TERM
IP alias Virtual interface
Gateway policy VPN gateway
Network policy (IPSec SA) VPN connection
Source NAT (SNAT) Policy route
Trigger port, port triggering Policy route
Address mapping Policy route
Address mapping (VPN) IPSec VPN
Interface bandwidth management (outbound)
General bandwidth management Policy route
Interface
Chapter 6 Configuration Basics

6.4 Packet Flow

Here is the order in which the ZyWALL applies its features and checks.
ZyWALL USG 20/20W User’s Guide
91
Chapter 6 Configuration Basics
Traffic in > Defragmentation > Destination NAT > Routing > Stateful Firewall > ADP > Application Classification > Content Filter > Anti-Spam > SNAT > Bandwidth Management > Fragmentation > Traffic Out.
Figure 51 Packet Flow
The packet flow is as follows:
• Automatic SNAT and WAN trunk routing for traffic going from internal to external interfaces (you don’t need to configure anything to all LAN to WAN traffic).
The ZyWALL automatically adds all of the external interfaces to the default WAN trunk. External interfaces include ppp and cellular interfaces as well as any Ethernet interfaces that are set as external interfaces.
Examples of internal interfaces are any Ethernet interfaces that you configure as internal interfaces.
• A policy route can be automatically disabled if the next-hop is dead.
• You do not need to set up policy routes for IPSec traffic.
• Policy routes can override direct routes.
• You do not need to set up policy routes for 1:1 NAT entries.
• You can create Many 1:1 NAT entries to translate a range of private network addresses to a range of public IP addresses
• Static and dynamic routes have their own category.
6.4.1 Routing Table Checking Flow
92
When the ZyWALL receives packets it defragments them and applies destination NAT. Then it examines the packets and determines how to route them. The checking flow is from top to bottom. As soon as the packets match an entry in one
ZyWALL USG 20/20W User’s Guide
Chapter 6 Configuration Basics
of the sections, the ZyWALL stops checking the packets against the routing table and moves on to the other checks, for example the firewall check.
Figure 52 Routing Table Checking Flow
1 Direct-connected Subnets: The ZyWALL first checks to see if the packets are
destined for an address in the same subnet as one of the ZyWALL’s interfaces. You can override this and have the ZyWALL check the policy routes first by enabling the policy route feature’s Use Policy Route to Override Direct Route option (see Section 13.1 on page 297).
2 Policy Routes: These are the user-configured policy routes. Configure policy
routes to send packets through the appropriate interface or VPN tunnel. See
Chapter 13 on page 297 for more on policy routes.
3 1 to 1 and Many 1 to 1 NAT: These are the 1 to 1 NAT and many 1 to 1 NAT
rules. If a private network server will initiate sessions to the outside clients, create a 1 to 1 NAT entry to have the ZyWALL translate the source IP address of the server’s outgoing traffic to the same public IP address that the outside clients use to access the server. A many 1 to 1 NAT entry works like multiple 1 to 1 NAT rules. It maps a range of private network servers that will initiate sessions to the outside clients to a range of public IP addresses. See Section 17.2.1 on page 340 for more.
ZyWALL USG 20/20W User’s Guide
93
Chapter 6 Configuration Basics
4 Auto VPN Policy: The ZyWALL automatically creates these routing entries for the
VPN rules. Disabling the IPSec VPN feature’s Use Policy Route to control dynamic IPSec rules option moves the routes for dynamic IPSec rules up above the policy routes (see Section 23.2 on page 394).
5 Static and Dynamic Routes: This section contains the user-configured static
routes and the dynamic routing information learned from other routers through RIP and OSPF. See Chapter 13 on page 297 for more information.
6 Default WAN Trunk: For any traffic coming in through an internal interface, if it
does not match any of the other routing entries, the ZyWALL forwards it through the default WAN trunk. See Section 12.2 on page 292 for how to select which trunk the ZyWALL uses as the default.
7 Main Routing Table: The default WAN trunk is expected to be used for any traffic
that did not match any earlier routing entries.
6.4.2 NAT Table Checking Flow
The checking flow is from top to bottom. As soon as the packets match an entry in one of the sections, the ZyWALL stops checking the packets against the NAT table and moves on to bandwidth management.
Figure 53 NAT Table Checking Flow
94
1 SNAT defined in the policy routes.
2 1 to 1 SNAT (including Many 1 to 1) is also included in the NAT table.
3 NAT loopback is now included in the NAT table instead of requiring a separate
policy route.
ZyWALL USG 20/20W User’s Guide
Chapter 6 Configuration Basics
4 SNAT is also now performed by default and included in the NAT table.

6.5 Feature Configuration Overview

This section provides information about configuring the main features in the ZyWALL. The features are listed in the same sequence as the menu item(s) in the Web Configurator. Each feature description is organized as shown below.
6.5.1 Feature
This provides a brief description. See the appropriate chapter(s) in this User’s Guide for more information about any feature.
This shows you the sequence of menu items and tabs you should click
MENU ITEM(S)
to find the main screen(s) for this feature. See the web help or the related User’s Guide chapter for information about each screen.
These are other features you should configure before you configure the main screen(s) for this feature.
If you did not configure one of the prerequisites first, you can often
PREREQUISITES
WHERE USED
Example: This provides a simple example to show you how to configure this feature. The example is usually based on the network topology in Figure 50 on
page 90.
select an option to create a new object. After you create the object you return to the main screen to finish configuring the feature.
You may not have to configure everything in the list of prerequisites. For example, you do not have to create a schedule for a policy route unless time is one of the criterion.
There are two uses for this.
These are other features you should usually configure or check right after you configure the main screen(s) for this feature. For example, you should usually create a policy route for a VPN tunnel.
You have to delete the references to this feature before you can delete any settings. For example, you have to delete (or modify) all the policy routes that refer to a VPN tunnel before you can delete the VPN tunnel.
Note: PREQUISITES or WHERE USED does not appear if there are no prerequisites
or references in other features to this one. For example, no other features reference DDNS entries, so there is no WHERE USED entry.
ZyWALL USG 20/20W User’s Guide
95
Chapter 6 Configuration Basics
6.5.2 Licensing Registration
Use these screens to register your ZyWALL and subscribe to services like more SSL VPN tunnels, and content filtering. You must have Internet access to myZyXEL.com.
MENU ITEM(S) PREREQUISITES
6.5.3 Interface
See Section 6.2 on page 88 for background information.
Note: When you create an interface, there is no security applied on it until you assign
it to a zone.
Most of the features that use interfaces support Ethernet, PPPoE/PPTP, cellular, VLAN, and bridge interfaces.
MENU ITEM(S) PREREQUISITES WHERE USED
Example: The dmz interface is in the DMZ zone and uses a private IP address. To configure dmz’s settings, click Network > Interface > Ethernet and then the
dmz’s Edit icon.
Configuration > Licensing > Registration
Internet access to myZyXEL.com
Configuration > Network > Interface (except Network > Interface > Trunk)
Port groups (configured in the Interface > Port Grouping screen)
Zones, trunks, IPSec VPN, DDNS, policy routes, static routes, HTTP redirect, NAT
6.5.4 Trunks
Use trunks to set up load balancing using two or more interfaces.
MENU ITEM(S) PREREQUISITES WHERE USED
Example: See Chapter 7 on page 107.
6.5.5 Policy Routes
Use policy routes to override the ZyWALL’s default routing behavior in order to send packets through the appropriate interface or VPN tunnel. You can also use policy routes for bandwidth management (out of the ZyWALL), port triggering,
96
Configuration > Network > Interface > Trunk
Interfaces
Policy routes
ZyWALL USG 20/20W User’s Guide
Chapter 6 Configuration Basics
and general NAT on the source address. You have to set up the criteria, next-hops, and NAT settings first.
MENU ITEM(S)
PREREQUISITES
Example: You have an FTP server connected to P6 (in the DMZ zone). You want to limit the amount of FTP traffic that goes out from the FTP server through your WAN connection.
1 Create an address object for the FTP server (Object > Address).
2 Click Configuration > Network > Routing > Policy Route to go to the policy
route configuration screen. Add a policy route.
3 Name the policy route.
4 Select the interface that the traffic comes in through (P3 in this example).
Configuration > Network > Routing > Policy Route
Criteria: users, user groups, interfaces (incoming), IPSec VPN (incoming), addresses (source, destination), address groups (source, destination), schedules, services, service groups
Next-hop: addresses (HOST gateway), IPSec VPN, SSL VPN, trunks, interfaces
NAT: addresses (translated address), services and service groups (port triggering)
5 Select the FTP server’s address as the source address.
6 You don’t need to specify the destination address or the schedule.
7 For the service, select FTP.
8 For the Next Hop fields, select Interface as the Type if you have a single WAN
connection or Trunk if you have multiple WAN connections.
9 Select the interface that you are using for your WAN connection. If you have
multiple WAN connections, select the trunk.
10 Specify the amount of bandwidth FTP traffic can use. You may also want to set a
low priority for FTP traffic.
Note: The ZyWALL checks the policy rou tes in the order that they are listed. So make
sure that your custom policy route comes before any other routes that would also match the FTP traffic.
ZyWALL USG 20/20W User’s Guide
97
Chapter 6 Configuration Basics
6.5.6 Static Routes
Use static routes to tell the ZyWALL about networks not directly connected to the ZyWALL.
MENU ITEM(S) PREREQUISITES
6.5.7 Zones
See Section 6.2 on page 88 for background information. A zone is a group of interfaces and VPN tunnels. The ZyWALL uses zones, not interfaces, in many security settings, such as firewall rules and remote management.
Zones cannot overlap. Each interface and VPN tunnel can be assigned to at most one zone. Virtual interfaces are automatically assigned to the same zone as the interface on which they run. When you create a zone, the ZyWALL does not create any firewall rules, or configure remote management for the new zone.
MENU ITEM(S) PREREQUISITES WHERE USED
Example: For example, to create the DMZ-2 zone, click Network > Zone and then the Add icon.
Configuration > Network > Routing > Static Route
Interfaces
Configuration > Network > Zone
Interfaces, IPSec VPN, SSL VPN
Firewall, remote management, ADP
6.5.8 DDNS
Dynamic DNS maps a domain name to a dynamic IP address. The ZyWALL helps maintain this mapping.
MENU ITEM(S) PREREQUISITES
6.5.9 NAT
Use Network Address Translation (NAT) to make computers on a private network behind the ZyWALL available outside the private network.
The ZyWALL only checks regular (through-ZyWALL) firewall rules for packets that are redirected by NAT, it does not check the to-ZyWALL firewall rules.
MENU ITEM(S)
98
Configuration > Network > DDNS
Interface
Configuration > Network > NAT
ZyWALL USG 20/20W User’s Guide
Chapter 6 Configuration Basics
PREREQUISITES
Example: Suppose you have an FTP server with a private IP address connected to a DMZ port. You could configure a NAT rule to forwards FTP sessions from the WAN to the DMZ.
1 Click Configuration > Network > NAT to configure the NAT entry. Add an entry.
2 Name the entry.
3 Select the WAN interface that the FTP traffic is to come in through.
4 Specify the public WAN IP address where the ZyWALL will receive the FTP packets.
5 In the Mapped IP field, list the IP address of the FTP server. The ZyWALL will
forward the packets received for the original IP address.
6 In Mapping Type, select Port.
7 Enter 21 in both the Original and the Mapped Port fields.
Interfaces, addresses (HOST)
6.5.10 HTTP Redirect
Configure this feature to have the ZyWALL transparently forward HTTP (web) traffic to a proxy server. This can speed up web browsing because the proxy server keeps copies of the web pages that have been accessed so they are readily available the next time one of your users needs to access that page.
The ZyWALL does not check to-ZyWALL firewall rules for packets that are redirected by HTTP redirect. It does check regular (through-ZyWALL) firewall rules.
MENU ITEM(S) PREREQUISITES
Example: Suppose you want HTTP requests from your LAN to go to a HTTP proxy server at IP address 192.168.3.80.
1 Click Configuration > Network > HTTP Redirect.
2 Add an entry.
Configuration > Network > HTTP Redirect
Interfaces
3 Name the entry.
4 Select the interface from which you want to redirect incoming HTTP requests
(lan1).
ZyWALL USG 20/20W User’s Guide
99
Chapter 6 Configuration Basics
5 Specify the IP address of the HTTP proxy server.
6 Specify the port number to use for the HTTP traffic that you forward to the proxy
server.
6.5.11 ALG
The ZyWALL’s Application Layer Gateway (ALG) allows VoIP and FTP applications to go through NAT on the ZyWALL. You can also specify additional signaling port numbers.
MENU ITEM(S)
6.5.12 Auth. Policy
Use authentication policies to control who can access the network. You can authenticate users (require them to log in) and even perform Endpoint Security (EPS) checking to make sure users’ computers comply with defined corporate policies before they can access the network.
MENU ITEM(S) PREREQUISITES
6.5.13 Firewall
The firewall controls the travel of traffic between or within zones. You can also configure the firewall to control traffic for NAT (DNAT) and policy routes (SNAT). You can configure firewall rules based on schedules, specific users (or user groups), source or destination addresses (or address groups) and services (or service groups). Each of these objects must be configured in a different screen.
Configuration > Network > ALG
Configuration > Auth. Policy
Addresses, services, endpoint security objects, users, authentication methods
100
To-ZyWALL firewall rules control access to the ZyWALL. Configure to-ZyWALL firewall rules for remote management. By default, the firewall only allows management connections from the LAN or WAN zone.
MENU ITEM(S)
PREREQUISITES
Example: Suppose you have a SIP proxy server connected to the DMZ zone for VoIP calls. You could configure a firewall rule to allow VoIP sessions from the SIP proxy server on DMZ to the LAN so VoIP users on the LAN can receive calls.
Configuration > Firewall
Zones, schedules, users, user groups, addresses (source, destination), address groups (source, destination), services, service groups
ZyWALL USG 20/20W User’s Guide
Loading...